TW556160B - Revocation information updating method, revocation information updating apparatus and storage medium - Google Patents

Revocation information updating method, revocation information updating apparatus and storage medium Download PDF

Info

Publication number
TW556160B
TW556160B TW089122735A TW89122735A TW556160B TW 556160 B TW556160 B TW 556160B TW 089122735 A TW089122735 A TW 089122735A TW 89122735 A TW89122735 A TW 89122735A TW 556160 B TW556160 B TW 556160B
Authority
TW
Taiwan
Prior art keywords
data
electronic device
invalidation
key code
storage medium
Prior art date
Application number
TW089122735A
Other languages
Chinese (zh)
Inventor
Shunji Harada
Makoto Tatebayashi
Masayuki Kozuka
Teruto Hirota
Toru Kamibayashi
Original Assignee
Matsushita Electric Ind Co Ltd
Toshiba Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matsushita Electric Ind Co Ltd, Toshiba Corp filed Critical Matsushita Electric Ind Co Ltd
Application granted granted Critical
Publication of TW556160B publication Critical patent/TW556160B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy

Abstract

A storage medium (PM) 13 includes a controller 130 and two types of storage regions, the concealed region 134 and the open region 131. The open region 131 includes an open RW 133 storing a digital content, an open ROM-W region 132a storing, as revocation information, identification information of an electronic appliance that is prohibited from accessing the digital content, and an open ROM region 132 storing, as master revocation information, identification information of an electronic appliance that is prohibited from updating the revocation information. When the storage medium is loaded into an electronic appliance that has identification information which is registered in the open ROM region 132, the controller 130 prohibits the electronic appliance from updating the revocation information.

Description

556160 A7 B7 五、發明說明()1 〈發明之技術背景 Background of the Invention〉 1 ·發明之技術領域Field of the Invention 本發明係有關一種用以儲存數位内容如程式、數位化 文字、音頻及影像的儲存媒體,以及有關一種能防止未經 授權的電子裝置錄製或再製數位内容的更新失效資料方 法。 2.相關技藝之說明 Description of the Related Art 近年來,數位及微處理器的進步已使得電子裝置朝著 多樣性的方向發展。其中一個例子便是備有多媒體設備的 個人電腦、轉頻器、再製裝置與遊戲控制台。除了自錄製 媒體再製影像資料、音頻資料與其他的數位内容之外,電 子裝置也能從網際網路上下載數位内容。 數位内容大都是以一種用MPEG2 (動晝壓縮標準2)或 MPEG3 (動晝壓縮標準-音頻層3)技術數位編碼的著作權 資料。這些資料能在不損及其品質的情況下在網路上被複 製並傳送。這表示對發展防止侵害數位内容的著作權等不 恰當動作的技術有著迫切的需求。 目前的電子裝置,如個人電腦、轉頻器、再製裝置等 大多使用”可逆寫”的錄製媒體,該可逆寫的錄製媒體在此 表示非相依參與者的錄製媒體。此種媒體根據公開規格運 作。這使得使用者能任意地傳輸或複製數位内容到其他的 媒體上,根本沒有有效的方法能保護已錄製在錄製媒體上 的數位内容。 整合錄製媒體與控制器的記憶卡近來已出現在市場 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂---------. 經濟部智慧財產局員工消費合作社印製 A7556160 A7 B7 V. Description of the Invention (1) <Background of the Invention> 1. Field of the Invention The invention relates to a method for storing digital content such as programs, digitized text, audio, and video. Storage media, and a method of updating invalid data that prevents unauthorized electronic devices from recording or reproducing digital content. 2. Description of the Related Art In recent years, advances in digital and microprocessors have made electronic devices develop in a variety of directions. One example is a personal computer with a multimedia device, a frequency converter, a reproduction device, and a game console. In addition to self-recording media to reproduce image data, audio data, and other digital content, electronic devices can also download digital content from the Internet. Digital content is mostly copyrighted material that is digitally encoded using MPEG2 (Dynamic Compression Standard 2) or MPEG3 (Dynamic Compression Standard-Audio Layer 3) technology. This data can be copied and transmitted over the network without compromising its quality. This means that there is an urgent need to develop technologies to prevent inappropriate actions such as copyright infringement on digital content. Most current electronic devices, such as personal computers, frequency converters, and reproduction devices, use "reversible" recording media. The reversible recording medium here refers to the recording media of non-dependent participants. Such media operate according to public specifications. This allows users to arbitrarily transfer or copy digital content to other media. There is no effective way to protect digital content that has been recorded on the recording media. Memory cards that integrate recording media and controllers have recently appeared on the market. This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the precautions on the back before filling this page). Order --- ------. Printed by A7, Consumer Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs

五、發明說明()2 上。這種卡備置一種透過特殊程序利用控制器的存取控制 功能才可進入的被保護區域(此後稱隱式區域),否則使用 者便無法進出。人們相信利用隱式區域儲存重要資料(如 複製控制資料與傳輸控制資料)能更安全地保護數位内 容。 以下將敘述一種能夠保護數位内容著作權的方法。當 數位内容在上述任一電子裝置與一錄製媒體之間傳輸時, 二種裝置都將首先進行互相鑑別的工作。這意味著每一裝 置互相檢查對方疋否為配備有相同著作權保護機制(即事 先決疋的内谷保護功能)的裝置。當二方裝置的真實性確 定後,它們根據雙方都備置的鑰匙碼產生演算法來交換鍮 匙碼。二方裝置因而都取得鑑別鑰匙碼,並利用此鑑別鑰 匙碼來個別加密並解密任一内容输匙碼(不同於用於加密 數位内容的鍮起碼),或加密並解密數位内容本身。 經濟部智慧財產局員工消費合作社印製 上述技術有以下的問題。電子裝置中的内容保護機制 (如用來互相鑑別的資料或程式)必須在電子裝置從工廠出 知刖就先设疋好。在消費者購買之後,電子裝置(或者更 確定來說是運作電子裝置的程式)可能會受到干預,使得 内容保護機制無法有效地運作。光靠互相鑑別的方法並無 法檢測或停止該改良電子裝置,因此數位内容仍有可能不 恰當地被使用。 藉著在錄製媒體上一特殊區域中事先錄製失效資料可 能可以對數位内容提供較佳的保護。失效資料會顯示無效 電子裝置應該被禁止存取儲存在錄製媒體上的内容。該失 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 X 297公爱) 556160 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明()3 效資料能為無效電子裝置以識別資料表單的方式形成。當 錄製媒體載入登錄在失效資料的一電子裝置中時,此電子 裝置便被禁止進入錄製媒體。換言之,利用使電子裝置進 入錄製媒體的權利無效的方法,錄製媒體上的内容得以被 保護。 這方法有一個缺點,就是它仍必須在電子裝置從工廠 出貨前,在一不可逆寫的區域中設定失效資料。這表示了 一旦玩弄電子裝置(或電子裝置的程式)將導致在錄製媒體 被製造後新型無效電子裝置的出現,該電子裝置便無法加 諸至錄製媒體上的失效資料中。此種電子裝置的違法存取 便無法被防止。 〈發明之概要說明 Summary of the Invention〉 有鑑於上述問題,本發明的目的是對失效資料提供一 儲存媒體,即使是未經授權電子裝置出現於儲存媒體已經 被製造之後,也能防止一未經授權電子裝置進入數位内 容。本發明的目標同時也提供了一種適合於儲存媒體的失 效資料更新裝置與方法。 上述目的藉由一已安裝入電子裝置的儲存媒體而達 成,此儲存媒體包含了,一用以儲存數位内容的内容儲存 區;一用以儲存對應於電子裝置的識別資料的資料的失效 資料儲存區,該識別資料防止存取儲存於内容儲存區中的 數位内容;一用以儲存對應於一電子裝置的識別資料的資 料的主失效資料儲存區,該識別資料防止更新儲存於失效 請 先 閱 背 面 之 注U 意 項 Ιΐ 訂 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 556160 經濟部智慧財產局員工消費合作社印製 五、發明說明(貝料儲存區中的失效資料。 icJL ι» 1的構造’應該不可更新失效資料的對應於未 J2^ I置的識別資料的資料,必須事先在儲存媒體 失效S料儲存區中登錄。藉由提及此資料,儲存媒體 月b知道嘗減著進入失效資料的電子裝置是一授權的電子裝 置或疋一未經授權的電子裝置。 該失效資料儲存於一安全而可逆寫的儲存區,即便當 未經授權的電子裝置在儲存媒體已被製造後才出現,對 應5 經授權電子裴置的識別資料的資料也能另登錄於 失效貝料儲存區。如此一來,可以防止未經授權的電子裝 置存取儲存在儲存媒體中的數位產品。 在這,儲存媒體可另包含:一用以執行第一判斷的内 、蔓P件匕判斷已安裝儲存媒體的一電子裝置是否擁 有對應儲存於失效資料餘存區的失效資料的鏗別資料, 第判斷的結果呈否定時,該内容保護部件允許電子裝 進入储存在内容齡:#料區賴_容;—用以執行第 判斷的失效資料更新部件,它判斷已安裝儲存媒體的一 子裝置是否擁有對應餘存於主失效資料餘存區的主失效貝 料_資料’當第二判斷結果呈否㈣,該更新部件允 許電子裝置更新儲存在失效資料错存資料區的失效資料。 根據以上的構造,只有擁有不對應於主 區的:別資料的電子裝置,才能更新 失效資料。這表示能防止未經授權的電 、、 斜。 ^裝置玩弄失效 當 置 電 資 資 請 先 閱讀. 背 面 之 注. 項5. Description of the invention () 2 above. This card is equipped with a protected area (hereinafter referred to as the hidden area) that can only be accessed by using the controller's access control function through a special program, otherwise the user cannot enter or exit. It is believed that using hidden areas to store important data, such as copy control data and transmission control data, will protect digital content more securely. A method for protecting the copyright of digital content will be described below. When digital content is transmitted between any of the electronic devices and a recording medium, both devices will first perform mutual authentication. This means that each device checks each other to see if it is a device equipped with the same copyright protection mechanism (that is, the inner valley protection function that is prerequisite). When the authenticity of the two-party device is determined, they exchange key codes based on the key code generation algorithm prepared by both parties. Both devices thus obtain an authentication key code and use this authentication key code to individually encrypt and decrypt any content key (different from the minimum code used to encrypt digital content), or to encrypt and decrypt the digital content itself. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs The above technologies have the following problems. Content protection mechanisms in electronic devices (such as data or programs used for mutual authentication) must be set up before the electronic devices are known from the factory. After the consumer purchases, the electronic device (or, more specifically, the program that operates the electronic device) may be intervened, making the content protection mechanism ineffective. Mutual authentication alone cannot detect or stop the improved electronic device, so digital content may still be used inappropriately. It may be possible to provide better protection of digital content by pre-recording invalid material in a special area on the recording medium. Invalid data will indicate invalidity Electronic devices should be barred from accessing content stored on recording media. The lost paper size is in accordance with Chinese National Standard (CNS) A4 specification (21〇X 297 public love) 556160 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention () 3 Forms to identify data forms. When the recording medium is loaded into an electronic device registered with invalid data, the electronic device is prohibited from entering the recording medium. In other words, by invalidating the right of the electronic device to enter the recording medium, the content on the recording medium is protected. A disadvantage of this method is that it still has to set the failure data in an irreversible area before the electronic device is shipped from the factory. This means that once playing with the electronic device (or the program of the electronic device) will lead to the emergence of a new type of invalid electronic device after the recording medium is manufactured, the electronic device cannot be added to the invalidation data on the recording medium. Illegal access to such electronic devices cannot be prevented. <Summary of the Invention> In view of the above-mentioned problems, the purpose of the present invention is to provide a storage medium for expired data. Even if an unauthorized electronic device appears after the storage medium has been manufactured, an unauthorized Authorize electronic devices to access digital content. The object of the present invention also provides a device and method for updating invalid data suitable for a storage medium. The above object is achieved by a storage medium that has been installed in an electronic device. The storage medium includes: a content storage area for storing digital content; and an invalid data storage for storing data corresponding to identification data of the electronic device. Area, the identification data prevents access to the digital content stored in the content storage area; a master invalidation data storage area for storing data corresponding to the identification data of an electronic device, the identification data is prevented from being updated and stored in the failure, please read first Note U on the back I Item Iΐ The size of the paper used in the revised edition is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) 556160 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention (Invalidation in the shell material storage area) Data. The structure of icJL »1 should not be renewable. The data corresponding to the identification data that has not been placed in J2 ^ I must be registered in the storage medium failure storage area beforehand. By referring to this data, the storage medium Month b knows that the electronic device that is trying to enter the invalidation information is an authorized electronic device or an unauthorized electronic device The invalid data is stored in a secure and reversible storage area. Even if unauthorized electronic devices appear after the storage medium has been manufactured, the data corresponding to the identification data of 5 authorized electronic devices can be registered in another Dead material storage area. In this way, unauthorized electronic devices can be prevented from accessing digital products stored in the storage medium. Here, the storage medium may further include: an internal and a vinegar for performing the first judgment The software judges whether an electronic device that has installed storage media has unique data corresponding to the invalid data stored in the remaining area of the invalid data. If the result of the first judgment is negative, the content protection component allows the electronic device to enter the storage age: # 料 区 赖 _ 容; — A failed data update component for performing the first judgment, which determines whether a sub-device of the installed storage medium has a corresponding master failure material remaining in the remaining area of the master failure data_data 'when The second judgment result is negative, and the updating component allows the electronic device to update the failure data stored in the failure data error data area. According to the above structure Only when you have an electronic device that does not correspond to the main area: other data, you can update the invalid data. This means that you can prevent unauthorized electricity, tilt, etc. ^ Please read the device's charge when you play with it. Note on the back. item

If I訂 線 本紙張尺度刺巾目國家標準(CNS)AT規格(21〇 X 297公髮) 五、發明說明()5 在這’主失效資料錯存區可備置在R0M(唯讀記憶體) 中,其中主失效資料已事先被儲存。 它能在製造儲存媒體後,保護倚存媒體免於被主失效 資料的攻擊玩弄。 在這,儲存媒體可另包含··一用以在失效資料更新部 件執行第二判斷前,利用已安裝儲存媒體的一電子裝置執 行互相鑑別的互相鏗別部件,並且當互相鑑別成功時,該 互相鑑別部件也製造一能與電子裝置共享的私密鑰起碼, 其中,失效資料更新部件利用以互相鑑別部件製造的私密 鍮起碼更新失效資料。 根據以上的構造,關於何種裝置有更新失效資料的權 限的決定性鑑別資料被安全地轉移到儲存媒體與-電子裝 置之間。這增加了保護失效資料的安全性。 在這,唯有當第二判斷結果呈否定時,失效資料更新 部件可傳送電子裝置必須更新失效資料的一私密鑰匙碼到 電子裝置。 因此’判斷一電子裝置是否有權限更新失效資料的結 果是保密的。這可以阻撓第三者試著攔截儲存媒體與一電 子裝置之間的通訊。 。在k,失效資料可分類成數個群組,而失效資料儲存 區可包含多個儲存區,而每個群組被健存在不同的储存區 中,而失效資料更新部件可判斷以下情況做為第二判斷: ()安裝了错存媒體的電子裝置是否擁有不對應於储存於 主失效貝料错存區域的主失效資料的識別資料;及⑺談 556160 A7 B7 五、發明說明()6 電子裝置是否擁有不對應於電子裝置希望更新的失效資料 的特定組群中的識別資料。只有在當(1)與(2)都是肯定的 答案時,第二判斷才是否定的,而失效資料更新部件只允 許電子裝置更新特定群組中的失效資料。 因此,即使當一未經授權第三者想玩弄失效資料,損 害也可控制在失效資料的一個群組中。失效資料的其他群 組則不會受到影響。 前述的發明目的也能藉由在儲存媒體上更新失效資料 的方法達成。此方法包含:一用以檢測儲存媒體是否已安 裝到電子裝置的的檢測步驟;一用以執行第一判斷對電子 裝置的第一鑑別是否不對應於儲存於儲存媒體的主失效資 料儲存區的主失效資料的判斷步驟;以及,只有在第一判 斷的結果是肯定時,用以更新儲存於失效資料儲存區的失 效資料的更新步驟。 經濟部智慧財產局員工消費合作社印製 前述的發明目的也能藉由用以更新儲存媒體上失效資 料的一失效資料更新裝置達成。該裝置包含:一用以儲存 第一鑑別資料的第一鑑別資料儲存部件,該第一鑑別資料 不對應於儲存於儲存媒體的主失效資料儲存區域的主限制 區;一用以取得與使用對應於儲存在第一鑑別資料儲存方 法之第一鑑別資料的許可取得部件,從儲存媒體取得更新 儲存於儲存媒體上的失效資料的許可;以及根據自許可取 得部件取得許可,用以更新儲存於儲存媒體上的失效資料 的更新部件。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 556160 A7 B7 五、發明說明()7 〈圖示的簡要說明 Brief Description of the Drawings〉 本發明的以上及其他目的、優點及特徵將在以下的敘 述、所附的圖示及具體施實例更明顯地顯現出來。 第1圖顯示本發明中一個實施例中著作權保護系統的 完整構造; 第2圖為一個内容分散系統(CDS)的構造的方塊圖; 第3圖為一個錄製媒體(PM)的構造的方塊圖; 第4圖顯示一 PM中開放rqM區域的錄製内容與構成; 第5圖顯示CDS的邏輯儲存區域; 第6圖為一錄製/回放裝置(可攜式裝置pD)的構造的方 塊圖; 第7圖顯示PD的邏輯儲存區域; 第8圖為一内容使用管理系統(特許依從模組LCM)的構 造的方塊圖; 第9圖顯示LCM的邏輯儲存區域· 第10圖顯不介於CDS、PM與處理流程間往來的前段部 分; 第11圖顯示介於CDS、Piu伽占 ^ 與處理流程間往來的後段部 經濟部智慧財產局員工消費合作社印製 分;以及 第12圖顯示介於CDS、PM與處㈣程間⑽來。 &lt;較佳實施例的說明DescripU〇n 〇f如如知㈣ Embodiments〉 以下將對照附圖詳述本發明的實施例。 -10- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297 - 556160 A7 B7 五、發明說明()8 第1圖顯示根據本實施例的著作權保護系統100的構 造。 著作權保護系統100保護數位資料的著作權,該數位 資料的著作權被電子性的分散或經由錄製媒體使用。如第 1所示,著作權保護系統100包含:一以販賣機的形式經由 網際網路電子性分散音樂内容的内容分散系統l(CDS)、 一用以儲存音樂内容的的錄製媒體13(以下稱可攜式媒體 PM13)、一在錄製音樂内容到PM13與從PM13回放音樂内 容的可攜式錄製/回放裝置12(以下稱可攜式裝置PD)、以 及一管理錄製、回放及傳輸音樂内容的内容使用控制系統 21(以下稱特許依從模組LCM)。 CD1、PM13與PD12配備了一個上述能更新失效資料 的功能或構造,即使在CD1、PM13與PD12已被製造後, 才發現未經授權電器的存在,也能防止未經授權電子裝置 不適當地進入數位產品。 經濟部智慧財產局員工消費合作社印製 第2圖為一顯示CD1構造的一方塊圖。架構40呈現一 電子音樂分配器(EMD),如一音樂伺服器或廣播站。架構 41呈現一失效資料特許實體(RLE)。當剛發現一未經授權 電子裝置時,RLE41為此電子裝置核發包括鑑別資料的新 失效資料。 CDS1能藉由一專業的終端機(如配電亭終端機)施行, 並能在一錄製商店找到。此CDS1經由傳輸路徑連接到 EMD40與RLE41,同時包含一保全音樂伺月艮器2(SMS2)、 一 EMD—I/F(介面)部件3、一PD 一 I/F部件5、一媒體_I/F部 -11- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 556160 經濟部智慧財產局員工消費合作社印製 Α7 Β7 五、發明說明()9 件6、一隱式區域驅動器7、一登錄儲存部件8、一特許儲 存部件9、一音樂數據儲存部件iG、__失效資料接收部件 14、-使用者Ι/F部件15、以及一失效資料儲存部件16。 CDS1的功能如下 ⑴功能錄製(購買)功能contents Recording (Purchasing) Function CDS1在PM13上錄製使用者所要的内容並載入cdsi 中。這與使用者購買内容相對應。 ⑺失效資料更新功能Rev〇cati〇n inf〇rmati〇n Updating Function CDSI在PM13上更新失效f料並載人CDSlt)j 。此失效 資料顯示了何項電子裝置應該被取消。 EMD—I/F部件3為-連結CDS i與數個EMD4〇的通信配 接器。PD—I/F部件5為一連結削之與⑶以的通用串列匯 流排(UBS)。媒體一l/F部件6為載入pM13至CDS1的 PCMCIA(個A電腦記憶卡國際協會)卡擴充槽。失效資料 接收部件14為-通信配接器,其接收即將登錄的失效資 料。使用者I/F部件15包括液晶顯示器(LCD)、開關、钮扣 式錄匙碼等。音樂數據儲存部件10為-儲存加密音樂内容 的快閃記憶體。登錄健存部件8是在音樂數據儲存部件1〇 中儲存音樂内容的健存屬性資料的記憶體。 特S午儲存部件9為一儲存鑰匙碼或其他資料的記憶 體’其使用在解密儲存在音樂數據儲存部件1〇中的加密音 樂内谷。失效貝料儲存部件16為—記憶體,其暫時儲存失 -12- ^紙張尺度適用中國國家標準(CNS)A4 297公 ---If I order the paper standard national standard (CNS) AT specifications (21 × 297 issued) V. Description of the invention () 5 In this' main invalid data error storage area can be placed in ROM (read-only memory) ), In which the master failure data has been stored in advance. It can protect the storage media from being attacked by the master's invalid data after the storage media is manufactured. Here, the storage medium may further include a mutually distinguishing component for performing mutual authentication by using an electronic device having the storage medium installed before performing the second judgment of the failed data update component, and when the mutual authentication succeeds, the The mutual authentication component also manufactures at least a private key that can be shared with the electronic device, wherein the invalidation data update component uses the private key manufactured with the mutual authentication component to update the invalidation data at least. According to the above structure, the definitive authentication data on which device has the right to update the invalidation data is safely transferred between the storage medium and the electronic device. This increases the safety of protecting stale data. Here, only when the second judgment result is negative, the revocation data updating unit can transmit a private key code that the electronic device must update the revocation data to the electronic device. Therefore, the result of judging whether an electronic device has the authority to update the invalidation information is confidential. This can prevent a third party from trying to intercept communication between the storage medium and an electronic device. . In k, the invalidation data can be classified into several groups, and the invalidation data storage area can include multiple storage areas, and each group is stored in a different storage area, and the invalidation data update component can determine the following as the first Two judgments: () Whether the electronic device installed with the wrong storage medium has identification data that does not correspond to the main failure data stored in the wrong storage area of the main failure material; and talk about 556160 A7 B7 V. Description of the invention () 6 Electronic device Whether it has identification data in a specific group that does not correspond to the invalidation data that the electronic device wishes to update. Only when both (1) and (2) are affirmative, the second judgment is negative, and the failure data updating component allows the electronic device to update the failure data in a specific group only. Therefore, even when an unauthorized third party wants to play with the invalidated data, the damage can be controlled in a group of the invalidated data. Other groups of stale data are not affected. The aforementioned object of the present invention can also be achieved by a method of updating invalid data on a storage medium. The method includes: a detection step for detecting whether a storage medium is installed in an electronic device; and a method for performing a first determination whether the first identification of the electronic device does not correspond to the main invalid data storage area stored in the storage medium. The judgment step of the main failure data; and an update step for updating the failure data stored in the failure data storage area only when the result of the first judgment is affirmative. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs The aforementioned invention object can also be achieved by an invalidated data updating device for updating invalidated data on a storage medium. The device includes: a first authentication data storage component for storing first authentication data, the first authentication data does not correspond to a main restricted area of a main invalid data storage area stored in a storage medium; A permission obtaining part of the first authentication data stored in the first authentication data storage method, obtaining a permission to update the stale data stored on the storage medium from the storage medium; and obtaining a permission according to the self-permission obtaining part to update the storage stored in the storage Update parts for invalid materials on the media. This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 556160 A7 B7 V. Description of the invention () 7 <Brief Description of the Drawings> The above and other objects and advantages of the present invention And the characteristics will be more apparent in the following description, the accompanying drawings and specific examples. Figure 1 shows the complete structure of a copyright protection system in an embodiment of the present invention; Figure 2 is a block diagram of the structure of a content distribution system (CDS); Figure 3 is a block diagram of the structure of a recording medium (PM) Figure 4 shows the recording content and composition of an open rqM area in a PM; Figure 5 shows the logical storage area of a CDS; Figure 6 is a block diagram of the structure of a recording / playback device (portable device pD); Figure 7 shows the logical storage area of PD; Figure 8 is a block diagram of the structure of a content usage management system (License Compliance Module LCM); Figure 9 shows the logical storage area of LCM · Figure 10 shows that it is not between CDS, The first part of the exchange between PM and the processing flow; Figure 11 shows the print between the CDS, Piu Gazhan ^ and the processing flow, and the consumer property cooperative printed by the Intellectual Property Bureau of the Ministry of Economic Affairs; and Figure 12 shows the CDS , PM and the office process came. &lt; Description of a preferred embodiment DescripUn 〇f as is known &gt; Embodiments of the present invention will be described in detail below with reference to the drawings. -10- This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297-556160 A7 B7) 5. Description of the invention () 8 Figure 1 shows the structure of the copyright protection system 100 according to this embodiment. Copyright protection system 100 Protect the copyright of digital materials, which are distributed electronically or used via recording media. As shown in Figure 1, the copyright protection system 100 includes: a digital distribution of music content via the Internet in the form of a vending machine. Content distribution system 1 (CDS), a recording medium 13 for storing music content (hereinafter referred to as portable media PM13), and a portable recording / playback device for recording music content to and from PM13 12 (hereinafter referred to as portable device PD), and a content use control system 21 (hereinafter referred to as the License Compliance Module LCM) that manages recording, playback, and transmission of music content. CD1, PM13, and PD12 are equipped with one of the above-mentioned updateable failure data Function or structure, even after CD1, PM13, and PD12 have been manufactured, the existence of unauthorized electrical appliances is discovered, which can prevent unauthorized electronic devices from Enter digital products appropriately. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. Figure 2 is a block diagram showing the structure of CD1. Architecture 40 presents an electronic music distributor (EMD), such as a music server or broadcast station. Architecture 41 presents a Failed Data Licensed Entity (RLE). When an unauthorized electronic device is just discovered, RLE41 issues new failed data for this electronic device including authentication data. CDS1 can be accessed by a professional terminal (such as a power distribution kiosk terminal) And can be found in a recording store. This CDS1 is connected to EMD40 and RLE41 via a transmission path, and contains a secure music server 2 (SMS2), an EMD-I / F (interface) component 3, a PD One I / F component 5. One media _I / F Department-11- This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 556160 Printed by the Intellectual Property Bureau Staff Consumer Cooperatives of the Ministry of Economic Affairs Α7 Β7 V. Description of the invention (9) 6, a hidden area drive 7, a registration storage part 8, a license storage part 9, a music data storage part iG, a __failure data receiving part 14, a user I / F File 15 and an invalid data storage component 16. The functions of CDS1 are as follows: Functions Recording (Purchasing) Function CDS1 records the content desired by the user on PM13 and loads it into cdsi. This is the same as the content purchased by the user. Corresponding. ⑺ Rev.cation inf〇rmation Updating Function CDSI updates the invalid data on PM13 and puts CDSlt) j. This failure information indicates which electronic device should be cancelled. The EMD-I / F unit 3 is a communication adapter that connects the CDS i with several EMD40s. The PD-I / F unit 5 is a universal serial bus (UBS) connected to the CU. Media 1 / F unit 6 is a PCMCIA (A Computer Memory Card International Association) card expansion slot loaded with pM13 to CDS1. The failure information receiving unit 14 is a communication adapter, which receives failure data to be registered. The user I / F unit 15 includes a liquid crystal display (LCD), a switch, a button key recording code, and the like. The music data storage unit 10 is a flash memory that stores encrypted music content. The registered health storage unit 8 is a memory that stores health storage attribute data of music content in the music data storage unit 10. The special storage unit 9 is a memory storing a key code or other data, which is used to decrypt the encrypted music valley stored in the music data storage unit 10. Failed shell material storage part 16 is-memory, which temporarily loses storage -12- ^ Paper size applies Chinese National Standard (CNS) A4 297 male ---

A7 B7 556160 五、發明說明()10 效資料,如從RLE41接收的失效資料。 隱式區域驅動器7為一控制電路,其利用一部未開放 的隱密程序進入登錄儲存部件8中的受保護儲存區域(以下 將詳述)。SMS2為一中央處理器(CPU),其執行處理控制 其他組件,進以達成以上所述的二項功能。 上述(1)與(2)所賦予的CDS1組件功能與SMS2控制功能 將在以下分開詳述。 ⑴功能錄製(購買)功能 Contents Recording (Purchasing) Function 在CDS1中,利用每一個錄製媒體(ΡΜΠ)的鑑另資料 加密與解密内容能保護内容免於被未授權的使用。 CDS1包含三個接收部件#1〜#3,其與EMD40#1〜#3互 相對應。由三個EMD分配的加密内容(即音樂内谷)與特§午 資料(使用情況、加密内容與解密鑰匙碼等),藉由對應的 接收部件#1〜#3接收。利用不同的加密方法與不同的音頻 編碼方法能製造EMD40分配的加密内容。每一個接收部 件#1〜#3也具備回放已接收音頻的功能與向使用者收費的 功能。此收費功能使得使用者能購買想要的内容。 經濟部智慧財產局員工消費合作社印製 SMS2透過EMD_I/F部件3接收使用者購買的已加密内 容。必要時,EMD_I/F部件3解密已加密内容,該已加密 内容被不同的EMD以音頻編碼及加密方法加密,EMD一I/F 部件3同時也利用一音頻編碼格式與加密格式傳送(再加密) 内容,該内容曾被CDS1利用。 在接收到一加密内容時,SMS2在音樂數據儲存部件10 -13- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 556160 A7 B7 五、發明說明()11 中儲存加密内容,並同時儲存一用以在特許儲存部件9中 解密已加密内容的鑰匙碼(加密内容解密鑰匙碼)。SMS2 可備置一回放功能以允許使用者聆聽一已被分散的音樂内 容。在這樣的情況下,由SMS2所管理的音樂内容可能在 CDS1上被重新製造。 SMS2備置一項功能,其透過媒體一i/f部件6,輸出儲 存在將音樂數據儲存部件10中的加密内容(音樂内容)到 PM13,如記憶卡,該記憶卡被載入媒體_I/F部件6中。 藉由在PD12中設立PM13,使用者能將PD12所解密並 回放的加密内容(音樂内容)錄製到PM13上。SMS12能直 接地透過媒體_I/F部件6或間接地透過PD12在PM13上錄製 内容。 使用者也能在LCM21中設立PM13。LCM13解密並回 放已錄製在PM13上的加密(音樂)内容。或者,使用者能 將PM13上的加密(音樂)内容傳輸到LCM21上,以便之後 在LCM21上儲存。 (2)失效資料更新功能 Revocation Information Updating Function 經濟部智慧財產局員工消費合作社印製 此失效資料用來鑑別電子裝置(如PD與LCM),該電子 裝置(如PD與LCM)應該被取消使用PM13的資格,以便保 護PM13上的内容。在此,,,使用PM13”表示錄製内容到 PM13上或是讀取或回放内容錄製在PM13上的内容。此失 效資料在製造過程中已事先錄製在PM13上。 一電子裝置執行失效資料更新功能,該電子裝置有特 -14- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱1 &quot; 556160 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明()12 殊的許可(如本例中的CD1)。必要時,此功能利用新的失 效資料更新在製造過程中就已經錄製在画的失效資 料。此失效資料在發現新的未經授權電子裝置並必須使其 無效時,需要被更新。 ⑽配備了失效資祕„件14,該料能從RLE41 接收新的失效資料。加密從咖41傳輪到CD1的新失效資 料’能避免玩弄二裝置之間的傳輸路徑。例如,可利用 RLE41與CD1事先共享的加密鑰匙碼來加密。 SM2透過失效資料接收部件14接收由社叫核發的已 加密新失效資料。該SM2解密該已加密新失效資料,並在 失效資料儲存部件16中儲存所得的新失效資料。當一 腫,如—記憶卡,被載入媒體一I/F部件6(即在媒體」 部件6檢測到PM13已被插入時),聰2所備置的功能透過 媒體一 I/F部件6輸出失效資料儲存部件16中的失效資料到 PM13。該SMS2能直接透過媒體一 I/F部件6或間接透财⑽ 在PM13上錄製新的失效資料。 以下將敘述各種不同的失效資料。要注意的是,錄製 媒體(此為PM13)不限於儲存數位化音樂,並且也能被另 用來作為錄製一應用系統,即所謂的,,電子書,,。這樣一來 失效資料為每個應用系統核發的。因此,電子裝置能分別 地為了各個應用系統而被取消,只有備有特殊許可的電子 裝置能為一特定的應用系統被准許更新對應於該應用系統 的更新失效資料。在此例中,CD1只能為主管數位化音樂 的電子裝置(如PD與LCM)更新失效資料。 -15-A7 B7 556160 V. Description of the invention () 10 effective data, such as failure data received from RLE41. The hidden area driver 7 is a control circuit that uses a hidden program that is not open to enter the protected storage area in the registration storage unit 8 (described in detail below). SMS2 is a central processing unit (CPU) that executes processing and controls other components to achieve the two functions described above. The CDS1 component functions and SMS2 control functions provided by the above (1) and (2) will be separately described in detail below. ⑴Function Recording (Purchasing) Function In CDS1, the authentication information of each recording medium (PMII) is used to encrypt and decrypt the content to protect the content from unauthorized use. CDS1 contains three receiving parts # 1 ~ # 3, which correspond to EMD40 # 1 ~ # 3. The encrypted content (ie, the inner valley of music) and special data (usage conditions, encrypted content, and decryption key code, etc.) distributed by the three EMDs are received by the corresponding receiving parts # 1 ~ # 3. Using different encryption methods and different audio coding methods can produce encrypted content distributed by EMD40. Each receiving part # 1 to # 3 also has a function of playing back received audio and a function of charging the user. This charging function enables users to purchase the desired content. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, SMS2 receives the encrypted content purchased by the user through EMD_I / F component 3. When necessary, EMD_I / F component 3 decrypts the encrypted content. The encrypted content is encrypted by different EMDs with audio encoding and encryption methods. EMD-I / F component 3 also uses an audio encoding format and an encrypted format for transmission (re-encryption). ) Content, which was used by CDS1. When receiving an encrypted content, SMS2 stores the encryption in the music data storage unit 10 -13- This paper size is in accordance with the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 556160 A7 B7 V. Description of the invention (11) Content, and at the same time store a key code (encrypted content decryption key code) for decrypting the encrypted content in the license storage unit 9. SMS2 can be equipped with a playback function to allow users to listen to a music content that has been dispersed. In such cases, the music content managed by SMS2 may be remanufactured on CDS1. SMS2 is equipped with a function that outputs the encrypted content (music content) stored in the music data storage part 10 to the PM13 through the media-i / f part 6, such as a memory card, which is loaded into the media_I / F parts 6. By setting up PM13 in PD12, users can record encrypted content (music content) decrypted and played back by PD12 onto PM13. SMS12 can record content on PM13 directly through Media_I / F component 6 or indirectly through PD12. Users can also set PM13 in LCM21. LCM13 decrypts and plays back the encrypted (music) content recorded on PM13. Alternatively, users can transfer encrypted (music) content from PM13 to LCM21 for later storage on LCM21. (2) Revocation Information Updating Function This information is printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs to identify electronic devices (such as PD and LCM), and the electronic devices (such as PD and LCM) should be cancelled using PM13. Qualification to protect content on PM13. Here, “PM13” is used to indicate the content recorded on PM13 or read or playback content recorded on PM13. This failure data has been recorded on PM13 in advance during the manufacturing process. An electronic device performs the failure data update function This electronic device has special -14- This paper size is applicable to Chinese National Standard (CNS) A4 specifications (210 X 297 Public Love 1 &quot; 556160 Employees' Cooperatives of Intellectual Property Bureau of the Ministry of Economy printed A7 B7 V. Description of invention () 12 Special permission (such as CD1 in this example). When necessary, this function uses new failure information to update the failure information that has been recorded in the painting during the manufacturing process. This failure information is necessary to find new unauthorized electronic devices and must When it is invalid, it needs to be updated. ⑽ Equipped with invalidation information „File 14, which can receive new invalidation information from RLE41. Encrypting the new invalidation information from Ka41 to CD1 'can avoid playing between the two devices. For example, it can be encrypted by using the encryption key code shared in advance by RLE41 and CD1. SM2 receives the encrypted new failure issued by the company through the failure data receiving unit 14 The SM2 decrypts the encrypted new invalidation data and stores the new invalidation data in the invalidation data storage unit 16. When a swell, such as a -memory card, is loaded into the media-I / F unit 6 (that is, the media "When component 6 detects that PM13 has been inserted), the function prepared by Satoshi 2 outputs the failure data in failure data storage component 16 to PM13 through media-I / F component 6. The SMS2 can directly pass through media-I / F component 6 or indirectly through the financial records Record new invalidation data on PM13. Various different invalidation data will be described below. It should be noted that the recording medium (this is PM13) is not limited to storing digital music and can also be used for other purposes As a recording of an application system, the so-called, e-books, etc. In this way, the invalidation data is issued for each application system. Therefore, the electronic device can be cancelled for each application system separately, only those with special permission The electronic device can be permitted to update the update failure information corresponding to the application system for a specific application system. In this example, CD1 can only be an electronic device that is responsible for digital music (such as PD and LC) M) Update the invalidation information.

556160 A7556160 A7

五、發明說明()13 以這樣的配置,即使一位使用者玩弄CD1的失效資料 更新功能’也不會影響其他應用系統,因為使用者仍將無 法更新其他應用系統中的失效資料。 同時,要取消一有特殊許可的電子裝置(如CD1),該 電子裝置有著特殊許可,能利用登錄在PM13上的特殊失 效資料(以下稱主失效資料)的來更新失效資料。換句話 說’顯示特殊電子裝置有特殊許可以更新失效資料的的主 失效資料,也能被引導入著作權保護系統,作為一未經授 權電子裝置的黑名單,而能另外改變失效資料。 例如,假設改變了 一特定CDS1的失效資料更新功能, 以允許未經授權的使用。鑑別此種CDS1的資料可以被加 諸在主失效資料中,以防止已修正的CDS1進入失效資料。 這便可能防止未經授權者玩弄失效資料。 在本實例中,要注意的是,假設利用不同於本發明所 揭示的方法來更新主失效資料。利用另外核發的一錄有新 主失效資料的錄製媒體以更新主失效資料,並利用該錄製 媒體以取代錄有舊主失效資料的舊錄製媒體。 經濟部智慧財產局員工消費合作社印製 第2圖為一個顯示PD12構造的方塊圖。這是一個可以 錄製及回放的裝置。 第3圖為一個顯示PM13構造的功能性方塊圖。從此圖 中可看出,該PM13包含一控制器130,以及由一開放區域 131與一隱式區域134所構成的錄製媒體部分。 此隱式區域134為一邏輯儲存區,唯有利用一私密程 序藉由控制器130才能進入該邏輯儲存區。該隱式區域134 -16-V. Description of the invention (13) With this configuration, even if a user plays with the CD1 invalid data update function, it will not affect other application systems, because the user will still be unable to update the invalid data in other application systems. At the same time, it is necessary to cancel an electronic device with a special license (such as CD1). The electronic device has a special license and can use the special failure data (hereinafter referred to as the master failure data) registered on the PM13 to update the failure data. In other words, the master failure information that shows that the special electronic device has special permission to update the failure information can also be directed into the copyright protection system as a blacklist of unauthorized electronic devices, and the failure information can be changed in addition. For example, suppose the invalidation data update function of a particular CDS1 is changed to allow unauthorized use. Data identifying such CDS1 can be added to the master failure data to prevent the modified CDS1 from entering the failure data. This may prevent unauthorized persons from playing with the invalidated data. In this example, it should be noted that it is assumed that the master failure data is updated using a method different from that disclosed in the present invention. Use a separately issued recording medium with new master failure data to update the master failure data, and use the recording medium to replace the old recording medium with old master failure data. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. Figure 2 is a block diagram showing the structure of PD12. This is a device that can record and play back. Figure 3 is a functional block diagram showing the structure of PM13. As can be seen from this figure, the PM13 includes a controller 130 and a recording medium portion composed of an open area 131 and an implicit area 134. The hidden area 134 is a logical storage area, and the logical storage area can only be accessed by the controller 130 using a private program. The hidden area 134 -16-

556160 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明()14 用來儲存解密時所需要的資料。如第3圖所示,隱式區域134 由一儲存著秘密常數的隱式ROM區域135(如以下將敘述 的獨特主媒體鑰匙碼Κ Μ _ Μ)與儲存著私密變數的隱式可 逆寫RW區域136(如以下將敘述的特許可者提供的特許解 密鑰匙碼、一已加密的的内容解密鑰匙碼、與一獨特媒體 鑰匙碼ΚΜ-1)所組成。此已被加密的内容解密鑰匙碼(以 下稱加密内容鑰匙碼)是利用加密内容鑰匙碼KC產生的, 該内容鑰匙碼KC則利用對ΡΜ13獨特的獨特媒體鑰匙碼 ΚΜ-1來解密内容C。 此獨特主媒體鑰匙碼Κ Μ - Μ與獨特媒體鑰匙碼Κ Μ -1必 須為每個ΡΜ13被設定在不同的數值上,如此才有可能為 每個ΡΜ13使用不同的鑑別資料,如一序號或一產品編號 (每個ΡΜ13的產品編號或生產抽籤號)。然而,ΚΜ-Μ與 ΚΜ-1可另從ΡΜ13的獨特鑑別資料與特許解密鑰匙碼製 造。舉例來說,隱式ROM區域135可實體地備置在ROM中 (即唯讀非依電性記憶體),而隱式RW區域136可備置在一 快閃記憶體中(即可逆寫非依電性記憶體)。 開放區域131與隱式區域分開,且祇能被傳統的程序 進入。此開放區域131包括一唯讀開放區域132(以下稱開 放ROM區域)與一可逆寫開放區域133(以下稱開放RM區 域)。如第4圖所示,假設開放ROM區域132同時也包含一 僅能根據私密程序被寫入的區域(以下稱開放ROM-W區域 132a)。 第4圖顯示PM13中開放ROM區域132及其儲存内容的 -17- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----j----訂---------線‘ (請先閱讀背面之注意事項再^&lt;寫本頁) 再填寫夫 556160 A7 B7 五、發明說明()15 組成。舉例來說’該開放ROM區域132能實體地備置在ROM 中,例如,開放RW區域133與開放ROM-W區域132a能實 體地備置在一快閃記憶體中。該開放ROM區域132、開放 RW區域133、與開放ROM-W區域132a能個別地備置在同 一ROM中作為隱式ROM區域315,並且在同一快閃記憶體 中作為隱式RW區域136。 主失效資料(RL-M)是在PM13從工廠出貨前,事先就 登錄在開放ROM區域132(以下意指開放R〇M區域132的部 分,但不是開放ROM-W區域132a)。一組或多組的失效資 料(RL-1,RL-2 )從工薇出貨前,也事先就登錄在開放 ROM-W區域132a中。利用執行CD1的失消資料更新功能 可替代(更新)該多組的失效資料,並能拫據一私密程序藉 由PM13的控制器130將新的失效資料寫入開放r〇m-W區 域132a。要注意的是,不需根據本發明所揭示的方法而更 新的一組或多組失效資料,也必須事先登錄在開放R〇M 區域132中。 經濟部智慧財產局員工消費合作社印製 在本實施例中,主失效資料與一組或多組的失效資料 便是必須被取消的電子裝置鑑別資料(64位元的裝置id)的 表單。因此’在以下的解釋中,每組的失效資料即為,,失 效表單RL”。主失效資料即為”RL-1,,與”rl-2”等。在本例 中’失效表早RL-1用來取消錄製或回放數位化音樂的電 子裝置(如PD或LCM)。 已被加後的内谷(以下簡稱為加密内容)與其他數據則 必須儲存在開放RW區域133。這些内容以内容鑰匙碼(KC) -18 - 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 556160 A7 B7 五、發明說明()16 加密。 第5圖顯示CDS1的邏輯儲存區域。CDS1有一開放區域 111,其由開放ROM區域112與開放RW區域113組成,以 及一個僅能根據私密鑰匙碼進入的隱式區域114。顯示在 第2圖的音樂數據儲存部件ι0備置在開放11冒區域ιη中。 該開放ROM區域112包含一開區域(未顯示),第 2圖中所示的失效資料儲存部件16便備置在開放R〇M-W區 域中。在此實施例中,第2圖中所示的SMS2解密從接收自 RLE41的加密的新失效資料,並利用一私密程序在該開放 ROM-W上儲存該已解密新失效資料。 鑑別資料(裝置ID)ID—CDS被事先儲存在隱式區域114 中。每個内容的内容鑰匙碼(KC)也同樣必要地儲存在隱 式區域114中。隱式區域114同時備置了如第2圖所示的登 錄儲存部件8。所有儲存在音樂數據儲存部件ι〇(開放rw 區域113)中且用SMS2管理的音樂内容,都有一内容ID(TID) 與其它相同的鑑別資料作為它的屬性。此屬性資料被稱為,, 登錄’’ ’且被儲存在登錄儲存部件8中(備置在隱式區域114 中)。 經濟部智慧財產局員工消費合作社印製 CDS1有一隱式區域驅動器7,其執行一特殊的私密程 序以使SMS2能進入隱式區域114中的登錄儲存部件8,並 隨後從登錄儲存部件8讀取數據。要注意的是,該登錄與 本發明應無直接相關性,因此它的用途並未詳述。 PD12包含一開放區域121,其由開放ROM區域122與 開放RW區域123所組成,以及一個僅能用私密程序進入 -19- 本紙張尺度適用中國國豕標準(CNS)A4規格(210 X 297公爱) 556160 A7 B7 五、發明說明()17 的隱式區域124。PD12的鑑別資料ΙΙλ^ΡΕ)永久地登錄在隱 式區域124 。每個内容中的内容鑰匙碼KC也都儲存在隱 式區域124中。 第6圖為顯示PD12的方塊圖。第7圖顯示PD中的邏輯 儲存區域。 PD12為一半導體音頻回放裝置戒類似之裝置。如第6 圖所示,PD12的硬體結構包含了一個中央處理器 CPU12a、一個隨機快取記憶體RAMl2b、一個唯讀記憶體 R0M12c、一個快閃記憶體12d、一個外部用品I/F部件12e、 一個媒體I/F部件12f、一個用以解密加密的音樂内容或其 他相關内容的解調部件12g、一個解碼器部件12h與一個用 以解碼及處理壓縮音頻内容的D/A變頻器部件12i。如第7 圖所示,PD12備置了一開放區域132與一隱式區域124。 如第6圖所示,PM13被使用在PD12的媒體Ι/p部件12f 上。當CDS1透過PD12讀寫數據時,備置在CDS1中的PD I/F 部件5透過PD 12的外部用品I/F部件12e與媒體I/F部件12f進 入PM13中的隱式區域134(詳見第3圖)。 經濟部智慧財產局員工消費合作社印製 該媒體I/F部件12f有一隱式區域存取部件(未標示),用 以進入PM 13中的隱式區域134。例如,PD 12的開放RW區 域123與隱式區域124備置於一快閃記憶體。一個能用PM13 施行相互鑑別的程式便寫入R0M12c中。在CPU12a的控制 下,PD12與此程式一同運作,用PM13施行相互鑑別。 第8圖為顯示LCM21構造的方塊圖。LCM21實施於個 人電腦,有著更新失效資料的特殊功能,基本上與CDS 1 -20 本紙張尺度適用中關家標準(CNS)A4規格(210 X 297公^ ' 556160 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明()18 有著相同的結構。換句話說,LCM21包含一 SMS22、一 EMD—I/F部件23、一PD_I/F部件25、一媒體I/F部件26、一 隱式區域驅動器27、一登錄儲存部件28、一特許儲存部件 29、一音樂數據儲存部件30、一 CD_I/F部件31以及一使 用者I/F部件35。與CDS1相同,LCM21有以下的功能。 LCM21能自一 EMD40接收一加密内容,並儲存該内容於 LCM21中。該LCM21能將儲存於LCM21的一加密内容錄 製到PM13上,或能從PM13上讀取一音樂内容,隨後便在 LCM21中儲存内容。 第9圖顯示備置於LCM21中的邏輯儲存區域。與 PM13、CDS1、PD12相同,LCM21備置 了一開放區域211, 該開放區域由一開放ROM區域122與一開放RW區域213組 成,也備置了 一僅能用特殊程序進入的隱式區域214。 LCM21的鑑別資料ID_LCM事先被儲存在隱式區域214 中,且不能改變。此隱式區域214也必要地為每一内容儲 存了 一内容鑰匙碼KC。 PM13用來載入LCM21中的媒體I/F部件26中。當從 PM13讀取數據或寫入數據至PM13時,PM13的隱式區域 134便被LCM21透過其中的媒體I/F部件26進入。此媒體I/F 部件26包含一個用以進入PM13中隱式區域134的隱式區域 讀取部件(未顯示)。例如,LCM21的開放RW區域213與隱 式區域214可以被備置在一快閃記憶體中。 此開放ROM區域212備置在一個唯讀記憶體ROM中。 一個能在PM13中施行相互鑑別的程式被寫入該ROM中。 -21- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ------^---^----^裝---------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 556160556160 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of Invention (14) It is used to store the data needed for decryption. As shown in FIG. 3, the hidden area 134 is composed of an implicit ROM area 135 storing a secret constant (such as a unique master media key code KM_M described below) and an implicit reversible write RW storing a private variable. The area 136 is composed of an authorized decryption key code, an encrypted content decryption key code, and a unique media key code KM-1 provided by a licensee as will be described below. This encrypted content decryption key code (hereinafter referred to as the encrypted content key code) is generated by using the encrypted content key code KC, which uses the unique media key code KM-1 unique to the PM13 to decrypt the content C. The unique master media key code KM-M and the unique media key code KM-1 must be set to different values for each PM13, so that it is possible to use different authentication information for each PM13, such as a serial number or a Product number (product number or production lottery number for each PM13). However, KM-M and KM-1 can be manufactured separately from the unique identification information of PM13 and the license decryption key code. For example, the implicit ROM area 135 may be physically located in ROM (that is, read-only non-dependent memory), and the implicit RW area 136 may be provided in a flash memory (that is, reverse-write non-dependent memory) Sexual memory). The open area 131 is separate from the hidden area and can only be accessed by traditional programs. The open area 131 includes a read-only open area 132 (hereinafter referred to as an open ROM area) and a reversible write open area 133 (hereinafter referred to as an open RM area). As shown in Fig. 4, it is assumed that the open ROM area 132 also contains an area that can be written only by a private program (hereinafter referred to as the open ROM-W area 132a). Figure 4 shows the open ROM area 132 in PM13 and its stored contents. -17- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ----- j ---- Order-- ------- Line '(Please read the precautions on the back before writing this page) and then fill in the husband 556160 A7 B7 V. Description of the invention () 15 composition. For example, 'the open ROM area 132 can be physically placed in ROM, for example, the open RW area 133 and the open ROM-W area 132a can be physically placed in a flash memory. The open ROM area 132, the open RW area 133, and the open ROM-W area 132a can be separately provided in the same ROM as the implicit ROM area 315, and in the same flash memory as the implicit RW area 136. The master failure data (RL-M) is registered in the open ROM area 132 (hereinafter referred to as the open ROM area 132, but not the open ROM-W area 132a) before PM13 is shipped from the factory. One or more sets of invalidation data (RL-1, RL-2) are also registered in the open ROM-W area 132a before being shipped from Gongwei. By performing the lost data update function of CD1, the multiple sets of failed data can be replaced (updated), and the new failed data can be written into the open ROM-W area 132a by the controller 130 of PM13 according to a private program. It should be noted that one or more sets of invalidation data need not be updated according to the method disclosed in the present invention, and must be registered in the open ROM area 132 in advance. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs In this embodiment, the master failure data and one or more sets of failure data are forms of electronic device identification data (64-bit device id) that must be cancelled. Therefore, in the following explanation, the invalidation data of each group is, the invalidation form RL. The main invalidation data is "RL-1," and "rl-2". In this example, the 'failure table' RL-1 is used to cancel the recording or playback of digital music electronic devices (such as PD or LCM). The added inner valley (hereinafter referred to as encrypted content) and other data must be stored in the open RW area 133. These contents are based on the content key code (KC) -18-This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 556160 A7 B7 5. The invention description () 16 is encrypted. Figure 5 shows the logical storage area of CDS1. CDS1 has an open area 111 consisting of an open ROM area 112 and an open RW area 113, and an implicit area 114 that can only be accessed by a private key code. The music data storage unit ι0 shown in Fig. 2 is provided in the open area 11m. The open ROM area 112 includes an open area (not shown), and the invalid data storage part 16 shown in FIG. 2 is prepared in the open ROM-W area. In this embodiment, the SMS2 shown in FIG. 2 decrypts the encrypted new invalidation data received from RLE41, and uses a private program to store the decrypted new invalidation data on the open ROM-W. The identification data (device ID) ID-CDS is stored in the hidden area 114 in advance. The content key code (KC) of each content is also stored in the hidden area 114 as necessary. The hidden area 114 is also provided with a login storage unit 8 as shown in FIG. All music content stored in the music data storage unit ι0 (open rw area 113) and managed by SMS2 has a content ID (TID) and other identical identification data as its attributes. This attribute data is called, registered '' and stored in the registration storage unit 8 (set in the hidden area 114). The CDS 1 printed by the Employee Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs has a hidden area drive 7 which executes a special privacy procedure to enable SMS 2 to enter the registration storage unit 8 in the hidden area 114 and then reads from the registration storage unit 8 data. It should be noted that this registration should have no direct relevance to the present invention, so its use is not detailed. PD12 includes an open area 121, which consists of an open ROM area 122 and an open RW area 123, and one that can only be accessed by a private program. -19- This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 cm). Love) 556160 A7 B7 V. The hidden area 124 of the invention description (17). PD12's authentication information 11A ^ PE) is permanently registered in the hidden area 124. The content key code KC in each content is also stored in the hidden area 124. Figure 6 is a block diagram showing PD12. Figure 7 shows the logical storage area in PD. PD12 is a semiconductor audio playback device or a similar device. As shown in Figure 6, the hardware structure of PD12 includes a central processing unit CPU12a, a random cache memory RAM12b, a read-only memory ROM12c, a flash memory 12d, and an external I / F component 12e. , A media I / F unit 12f, a demodulation unit 12g to decrypt encrypted music content or other related content, a decoder unit 12h, and a D / A inverter unit 12i to decode and process compressed audio content . As shown in FIG. 7, the PD 12 is provided with an open area 132 and an implicit area 124. As shown in Fig. 6, PM13 is used on the media I / p part 12f of the PD12. When CDS1 reads and writes data through PD12, the PD I / F component 5 provided in CDS1 enters the hidden area 134 in PM13 through the external supplies I / F component 12e and media I / F component 12f of PD 12 (see section 3 images). Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs The media I / F unit 12f has a hidden area access unit (not shown) for entering the hidden area 134 in PM 13. For example, the open RW area 123 and the hidden area 124 of the PD 12 are prepared in a flash memory. A program that can perform mutual authentication with PM13 is written in ROM12c. Under the control of CPU12a, PD12 works with this program and uses PM13 to perform mutual authentication. Figure 8 is a block diagram showing the structure of the LCM21. LCM21 is implemented in personal computers and has the special function of updating invalid data. It is basically the same as CDS 1 -20. This paper size applies the Zhongguan Family Standard (CNS) A4 specification (210 X 297 public ^ '556160 A7 B7 employees of the Intellectual Property Bureau of the Ministry of Economic Affairs) Printed by the Consumer Cooperative 5. The invention description (18) has the same structure. In other words, the LCM21 includes an SMS22, an EMD-I / F component 23, a PD_I / F component 25, a media I / F component 26, and a The hidden area driver 27, a registration storage unit 28, a license storage unit 29, a music data storage unit 30, a CD_I / F unit 31, and a user I / F unit 35. Like the CDS1, the LCM21 has the following functions LCM21 can receive an encrypted content from an EMD40 and store the content in LCM21. The LCM21 can record an encrypted content stored in LCM21 to PM13, or can read a music content from PM13, and then in LCM21 Figure 9 shows the logical storage area to be stored in LCM21. Like PM13, CDS1, and PD12, LCM21 is equipped with an open area 211. The open area consists of an open ROM area 122 and an open RW area 213. In addition, a hidden area 214 that can only be accessed by a special program is prepared. The identification data ID_LCM of the LCM21 is stored in the hidden area 214 in advance and cannot be changed. This hidden area 214 must also be stored for each content. A content key code KC. PM13 is used to load the media I / F component 26 in LCM21. When data is read from or written to PM13, the hidden area 134 of PM13 is passed through the media in LCM21. I / F component 26 enters. This media I / F component 26 includes an implicit area reading component (not shown) to access implicit area 134 in PM13. For example, open RW area 213 and implicit area 214 of LCM21 It can be stored in a flash memory. The open ROM area 212 is stored in a read-only memory ROM. A program that can perform mutual authentication in PM13 is written in the ROM. -21- This paper standard applies China National Standard (CNS) A4 Specification (210 X 297 mm) ------ ^ --- ^ ---- ^ Installation --------- Order -------- -Line (Please read the notes on the back before filling this page) 556160

五、發明說明()19 在中央處理器CPU(未顯示)的控制下,LCM21與此程式一 同運作,與PM13施行相互鑑別。 本實施例的著作權保護系統100將於以下敘述。在本 例中,使用者將PM13插入CDS13中,並選擇一由EMD40 錄製音樂内容到PM13的過程。這與使用者購買音樂内容 的動作相對應。在此例中,同時,由RLE核發並事先儲存 在CDS1中的新失效資料隨著音樂内容一同錄製在pmi3 上。 第10與11圖個別地顯示介於CDS1、PM13與處理流程 間往來的前後部分。舉例來說,當使用者透過CDS1的使 用者I/F部件15表示有購買音樂内容的意圖而PM13已被載 入媒體I/F部件6時,CDS1的媒體I/F部件6能與PM13(步驟 S101)的控制器130施行相互鑑別(又叫做主要的識別與鑰 匙碼交換AKE-M)。以下CDS1與PM13將施行此AKE-M程 經濟部智慧財產局員工消費合作社印製 首先,CDS1確認PM13的身分。一被允許更新失效資 料的CDS1備置了 一鑑別鑰匙碼K1-M,也就如同PM13(這 些未顯示出來的鑰匙碼儲存在隱式區域ROM中)。CDS1製 造一隨機數R1並將它傳送至PM13。當收到由CDS1所製造 的隨機數R1時,PM13利用鑑別鑰匙碼K1-M加密此隨機數 R1,並將所得的加密隨機數Rl(ia-M[R1])傳送至CDS1。 CDS1利用鑑別鑰匙碼K1-M來解密K1-M[R1]),並且,如 果結果與隨機數R1相等時,它便判定PM13為一適當裝 置。 -22- I . — ! π - 一 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 556160 A7 B7V. Description of the invention () 19 Under the control of the central processing unit CPU (not shown), the LCM21 operates in the same manner as this program and performs mutual authentication with PM13. The copyright protection system 100 of this embodiment will be described below. In this example, the user inserts PM13 into CDS13 and selects a process of recording music content to PM13 by EMD40. This corresponds to the action of the user to purchase music content. In this example, at the same time, the new invalidation material issued by RLE and stored in CDS1 in advance is recorded along with the music content on pmi3. Figures 10 and 11 show the front and back sections between the CDS1, PM13, and the processing flow individually. For example, when the user indicates through the user I / F component 15 of CDS1 that he has the intention to purchase music content and PM13 has been loaded into the media I / F component 6, the media I / F component 6 of CDS1 can communicate with PM13 ( The controller 130 in step S101) performs mutual authentication (also called main identification and key code exchange AKE-M). The following CDS1 and PM13 will implement this AKE-M process. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy. First, CDS1 confirms the identity of PM13. As soon as CDS1 is allowed to update the invalid data, an authentication key code K1-M is provided, which is also like PM13 (the key codes not shown are stored in the hidden area ROM). CDS1 creates a random number R1 and transfers it to PM13. When receiving the random number R1 made by CDS1, PM13 encrypts this random number R1 with the authentication key code K1-M, and transmits the resulting encrypted random number R1 (ia-M [R1]) to CDS1. CDS1 uses the authentication key code K1-M to decrypt K1-M [R1]), and if the result is equal to the random number R1, it judges PM13 as a proper device. -22- I. —! Π-a paper size applicable to China National Standard (CNS) A4 (210 X 297 mm) 556160 A7 B7

五、發明說明()2G 此後,PM13為CD S1施行相同的過程以完成互相鑑別 的工作。為了完成該工作,CDS1與PM13都有一鑑別鑰匙 碼K2-M,CDS1利用該鑑別鑰匙碼K2-M加密自PM13接收 的隨機數R2,且PM13解密並確認所得結果等於隨機數 R2。 在本例中,鑑別鑰匙碼K1-M與K2-M只提供給一特別 的電子裝置(在此為CDS1),該電子裝置允許更新失效資 料,因此普通的電子裝置(如LCM21)便禁止執行鑑別過程 AKE-M。 在上述步驟S101的互相鑑別過程中,當CDS1與PM13 都發現彼此為適當裝置時,CDS1的媒體I/F部件6與PM13 的控制器130交換鑰匙碼以共享相同的對話鑰匙碼 (KY1)。例如,該對話鑰匙碼(KY1)成為一數值,其為了 在互相鑑定過程製造的隨機數R1與R2的邏輯XOR所發 現,隨後並將結果輸出至事先備置在CDS1與PM13中的一 私密鑰匙碼製造演算法中。如此一來,對話鑰匙碼KY1則 為一個時變鑰匙碼,其數值隨每一對話而改變。 經濟部智慧財產局員工消費合作社印製 CDS1的媒體I/F部件6為CDS1讀取隱密地儲存在隱式 區域114中的主鑑別資料ID-Μ、利用對話鑰匙碼KY-1加密 該資料ID-Μ、並傳送所得加密ID-Μ到PM13(步驟S102)。 PM13的控制器130利用對話鑰匙碼(KY1)解密自CDS1 接收的KY1[ID-M],該對話鑰匙碼(KY1)在前導鑰匙碼交 換過程中接收,以取得ID-Μ(步驟S103)。 隨後,PM13的控制器130使用已解密的CDS1的主鑑別 -23- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 556160 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明()21 資料ID-Μ參照對開放ROM區域132的主失效表單rl_m。 控制器130藉著檢查是否有符合ID-Μ的鑑別資料存在於主 失效資料表單RL-M中,來判斷CDS1是否應該禁止使用 PM13(步驟S104)。 如果符合主失效資料表單RL-M的Ιβ·μ的鑑別資料存 在的話’控制器13 0利用CDS 1取消ΡΜ13的使用權,並在 此時結束執行。 另一方面而言,如果符合主失效資料表單111^]^的11)-Μ的鑑別資料並不存在的話,控制器130判定CDS1可使用 PM13(及更新失效資料)’且讀取並輸出秘密儲存在隱式 ROM區域135的獨特媒體鍮匙碼KM-M(步驟si〇5)。控制 器130隨後與CDS1的媒體I/F部件6交換鑰匙碼,以共享相 同的對話鑰匙碼KY-2,並在利用該對話鍮匙碼KY-2加密 已讀取的獨特主媒體錄匙之前’傳送所得已加密 鑰匙碼 KM-M(=KY2[KM-M])到 CDS 1 (步棘 s 106)。 例如,當前述對話鑰匙碼KY-1輸入炱事先備置在CDS1 與PM13的一私密鑰匙碼產生演算法中時’所得到的結果 為該對話输匙碼KY-2。 CDS1的媒體I/F部件6利用對話鑰匙碼(KY2)解密自 &amp;孰爲(ΚΥ1)在前導鍮 ΡΜ13接收的ΚΥ2[ΚΜ-Μ],該對話鑰冷 ^炙媒體鑰匙碼ΚΜ-匙碼交換過程中接收,並因此取得獨辑 Μ(步驟S107) ° 姥存在開放ROM-W 隨後,CDS1的媒體I/F部件6加密你 &amp;失效資料表單RL-區域與新獨特媒體鑰匙碼KM-iN的新 -24- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公髮)V. Description of the invention (2G) Thereafter, PM13 performs the same process for CD S1 to complete the work of mutual identification. To complete this work, both CDS1 and PM13 have an authentication key code K2-M. CDS1 uses this authentication key code K2-M to encrypt the random number R2 received from PM13, and PM13 decrypts and confirms that the result is equal to the random number R2. In this example, the authentication key codes K1-M and K2-M are only provided to a special electronic device (here CDS1). This electronic device allows updating of invalid data, so ordinary electronic devices (such as LCM21) are prohibited from executing. Identification process AKE-M. During the mutual authentication process in step S101, when both CDS1 and PM13 find that they are appropriate devices, the media I / F unit 6 of CDS1 and the controller 130 of PM13 exchange key codes to share the same session key code (KY1). For example, the dialog key code (KY1) becomes a value, which is found for the logical XOR of the random numbers R1 and R2 produced in the mutual authentication process, and then the result is output to a private key code prepared in advance in CDS1 and PM13. Manufacturing algorithm. In this way, the conversation key code KY1 is a time-varying key code, and its value changes with each conversation. The Media I / F part 6 of the CDS1 printed by the employee's consumer cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs reads the master authentication data ID-M, which is secretly stored in the hidden area 114, for CDS1, and encrypts this data with the conversation key code KY-1 ID-M, and transmits the obtained encrypted ID-M to PM13 (step S102). The controller 130 of the PM13 uses the session key code (KY1) to decrypt the KY1 [ID-M] received from the CDS1, and the session key code (KY1) is received during the leading key code exchange process to obtain the ID-M (step S103). Subsequently, the controller 130 of PM13 uses the decrypted master identification of CDS1. -23- This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 556160 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention (21) The data ID-M refers to the main invalidation form rl_m of the open ROM area 132. The controller 130 determines whether the CDS1 should prohibit the use of PM13 by checking whether there is identification data conforming to ID-M in the master invalidation data sheet RL-M (step S104). If the identification data of Iβ · μ conforming to the master failure data form RL-M exists, the 'controller 13 0 uses CDS 1 to cancel the use right of the PM 13 and ends the execution at this time. On the other hand, if the identification data of 11) -M that meets the main failure data form 111 ^] ^ does not exist, the controller 130 determines that CDS1 can use PM13 (and update the failure data) 'and reads and outputs the secret The unique media key KM-M stored in the hidden ROM area 135 (step s05). The controller 130 then exchanges the key code with the media I / F part 6 of the CDS1 to share the same session key code KY-2, and before using the session key code KY-2 to encrypt the read unique master media recording key 'Transfer the resulting encrypted key code KM-M (= KY2 [KM-M]) to CDS 1 (step s 106). For example, when the aforementioned conversation key code KY-1 is input and prepared in advance in a secret key code generation algorithm of CDS1 and PM13 ', the result obtained is the conversation key code KY-2. The media I / F component 6 of CDS1 uses the session key code (KY2) to decrypt from AMP 2 (KM-M) received at the leading 鍮 PM13. The dialog key is cold to the media key code KM-key code. Received during the exchange process, and thus obtain the unique edition M (step S107) ° 姥 There is an open ROM-W Subsequently, the media I / F part 6 of CDS1 encrypts you &amp; the invalid data form RL-area with the new unique media key code KM- iN's New-24- This paper size applies to China National Standard (CNS) A4 specifications (210 X 297)

556160 A7 B7 五、發明說明()zz 1,該開放ROM-W區域與新獨特媒體鑰匙碼KM-1N利用獨 特主媒體鑰匙碼KM-M由媒體I/F部件6製造,CDS1的媒體 I/F部件6並傳送所得加密KM-M[RL-1 ]與KM-M[KM- 1N]到 PM13(步驟S108)。 例如,此處參照的獨特媒體鑰匙碼KM-1N能做為輸出 數值,其由在前述的對話鑰匙碼KY2輸入至一秘密儲存在 CDS1的鑰匙碼產生演算法中製造。 PM13的控制器130利用儲存在隱式ROM區域135的 KM-M解密自 CDS1接收的 KM-M[RL-1 與 KM-M[KM-1N] ’ 並因此取得RL-1與KM-1N(步驟S109)。 隨後,CDS1的媒體I/F部件6與PM13的控制器130對上 述的相互鑑別(AKE-M)施行相似的互相鑑別(AKE-1)(步驟 S110)。 經濟部智慧財產局員工消費合作社印製 如此一來,CDS1首先鑑別PM13。為了要如此,CDS1 與PM13都儲存相同的鑑別鑰匙碼K1-1(並未顯示,儲存在 個別的隱式ROM區域中)。CDS1製造一隨機數R3J1將它 傳送至PM13。當收到由CDS1所製造的隨機數R3時,PM13 利用鑑別鑰匙碼K1-1加密此隨機數R3,並將所得的加密 隨機數(K1-1[R3])傳送至CDS1。CDS1利用鑑別鑰匙碼K1-1來解密K1-1[R3]),並且,如果結果與先前製造的隨機數 R3相等的話,它便判定PM13為一適當裝置。 此後,PM13為CDS1施行相同的過程以完成互相鑑別 的工作。為了完成該工作,CDS1與PM13都有一鑑別鑰匙 碼K2-1,CDS1利用該鑑別鑰匙碼K2-1加密自PM13接收的 -25- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 556160 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明()23 隨機數R4,且PM13解密並確認所得結果等於隨機數R4。 這些鑑別鑰匙碼K1-1與K2-1只備置於電子裝置(如PD〗2與 LCM16)中,該電子裝置允許使用音樂内容,因此可防止 對應於其他應用系統的電子裝置執行鑑別過程AKE·1。 在上述步驟S110的互相鑑別過程中AKE-1,當CDS1與 PM13都發現彼此為適當裝置時,CDS1的媒體I/F部件6與 PM13的控制器130施行鑰匙碼交換,以共享相同的對話鑰 匙碼(KX1)。例如,該對話鑰匙碼(KX1)為一數值,其為 了在互相鑑定過程製造的隨機數R3與R4的邏輯x〇R所發 現,隨後並將結果輸出至事先備置在CDS1與PM13中的一 私密鑰匙碼製造演算法。如此〆來,對話鑰匙碼KX1則為 一個時變输匙碼,其數值隨每/時間而改&amp;。 CDS 1的媒體I/F部件6為CPS1讀取隱密地儲存在隱式 區域114中的主鑑別資料⑴-丨、利用對話鑰匙碼KX-1加密 該資料ID小並傳送所得加密到應3(步 驟S111) 〇 ΡΜ13的控制器130利用對#鑰匙碼(ΚΧ1)解密自CDS1 接收的KX1[ID-1],該對話鑰匙碼(KX1)在前導鑰匙碼交 換過程中接收,並因此取得Π&gt;1(步骤S112)。 隨後,觀3的控制器130像用已解密的⑽1的主鑑別 資料ID-1參照對開放R0M區威132的主失效表单壯-1。控 制器13〇藉著檢査是否有符合价1的鑑別資料存在於主失 效資料表單RL-1中,來判斷CDS1是否應該禁止使用 PM13(步驟S113)。 -26 一 本紙張尺度適用中國國^標準(CNS)A4規格(210 X 297¾^ ----τ---:----·=裝----l·---訂---------線 (請先閱讀背面之注意事項再填寫本頁) «! 556160 A7 五、發明說明()24 如果符合主失效資料表單RL-1的IP」的鐘別資料存在 的話,控制器130利用CDS1取消PM13的使用權’並在此 時結束執行。 另一方面而言,如果符合主失效資科表單RL-1的ID-1 的鑑別資料不存在的話,控制器13〇列定CDS1可使用 PM13(即錄製一内容),並利用自步驟Sl〇9收到的新失效 資料RL-1N與新獨特媒體鑰匙碼KM-lN ’來更新RL-1與 KM-1(步驟S114)。 控制器130隨後與CDS1的媒體I/F邡件6交換錄起碼’ 以共享相同的對話鑰匙碼KX-2,並在從CDS1的隱式區域 114讀取鑑別資料id-1之前,傳送所#II&gt;1(=KX2[ID_1]) 到PMI3(步驟S115)。例如,當對話鑰匙碼Κχ_1輸入至事 先備置在CDS1與ΡΜ13的一私密鑰匙碼廣生演算法中時’ 所得到的數值便為該對話鑰匙碼ΚΧ-2。 ΡΜ13的控制器130利用對話鑰匙碼(ΚΧ2)解密自CDS1 接收的KX-2[ID-1],該對話鑰匙碼(ΚΧ2)在前導鑰匙碼交 換過程中接收,並因此取得獨特ID-1(步驟S116)。 經濟部智慧財產局員工消費合作社印製 隨後,PM13的控制器130使用已解密的CDS1的解密鑑 別資料參照對開放ROM區域的新失效表單RL_1N,並根據 是否有符合ID-1的鑑別資料存在於失效資料表單rl-1,來 判斷是否應該阻止CDS1使用PM13(步驟si 17)。 如果符合ID_M的鑑別資料存在於主失效資料表單RL-1N的話,控制器13〇判斷CDS1應禁止使用PM13,並在此 時結束執行。 -27- 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 X 297公釐) 經濟部智慧財產局員工消費合作社印製 556160 B7556160 A7 B7 5. Description of the invention () zz 1. The open ROM-W area and the new unique media key code KM-1N are manufactured by the media I / F component 6 using the unique master media key code KM-M, and the media I / of CDS1 The F unit 6 transmits the obtained encrypted KM-M [RL-1] and KM-M [KM-1N] to PM13 (step S108). For example, the unique media key code KM-1N referred to herein can be used as an output value, which is produced by the aforementioned key code KY2 for dialogue to a key code generation algorithm secretly stored in CDS1. The controller 130 of the PM13 uses the KM-M stored in the implicit ROM area 135 to decrypt the KM-M [RL-1 and KM-M [KM-1N] 'received from the CDS1, and thus obtains RL-1 and KM-1N ( Step S109). Subsequently, the media I / F section 6 of the CDS1 and the controller 130 of the PM13 perform a similar mutual authentication (AKE-1) on the above-mentioned mutual authentication (AKE-M) (step S110). Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. As a result, CDS1 first identified PM13. To do this, both CDS1 and PM13 store the same authentication key code K1-1 (not shown, stored in a separate hidden ROM area). CDS1 creates a random number R3J1 and transfers it to PM13. When receiving the random number R3 made by CDS1, PM13 encrypts this random number R3 with the authentication key code K1-1, and transmits the resulting encrypted random number (K1-1 [R3]) to CDS1. CDS1 uses the authentication key code K1-1 to decrypt K1-1 [R3]), and if the result is equal to the previously produced random number R3, it judges PM13 as an appropriate device. Thereafter, PM13 performs the same process for CDS1 to complete the work of mutual authentication. In order to complete this work, both CDS1 and PM13 have an authentication key code K2-1. CDS1 uses this authentication key code K2-1 to encrypt the -25 received from PM13.- This paper size applies to China National Standard (CNS) A4 (210 X 297) (Mm) 556160 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention () 23 Random number R4, and PM13 decrypted and confirmed that the result is equal to the random number R4. These authentication key codes K1-1 and K2-1 are only available in electronic devices (such as PD〗 2 and LCM16). This electronic device allows the use of music content, so it can prevent electronic devices corresponding to other application systems from performing the authentication process AKE · 1. During the mutual authentication process of step S110 above, AKE-1, when both CDS1 and PM13 find each other to be a proper device, the media I / F part 6 of CDS1 and the controller 130 of PM13 perform a key code exchange to share the same conversation key Code (KX1). For example, the dialog key code (KX1) is a value, which is found for the logical number x0R of the random numbers R3 and R4 produced in the mutual authentication process, and then the result is output to a privately stored in CDS1 and PM13 in advance Key code manufacturing algorithm. In this way, the conversation key code KX1 is a time-varying key code, and its value changes with each time. The media I / F part 6 of CDS 1 reads the master authentication data that is stored in the hidden area 114 for CPS1. It is encrypted with the session key code KX-1, and the data ID is small, and the obtained encryption is transmitted to the corresponding (Step S111) The controller 130 of the OPM13 decrypts the KX1 [ID-1] received from the CDS1 by using the #key code (KKX1), which is received during the leading key code exchange process, and thus obtains Π &gt; 1 (step S112). Subsequently, the controller 130 of the watch 3 uses the decrypted master authentication data ID-1 of the ⑽1 to refer to the master invalidation form Z-1 of the open ROM 132. The controller 13 judges whether or not CDS1 should prohibit the use of PM13 by checking whether or not there is authentication data corresponding to the price 1 in the master failure data sheet RL-1 (step S113). -26 A paper size is applicable to China National Standard (CNS) A4 specifications (210 X 297¾ ^ ---- τ ---: -------- = installed ---- l · --- order --- ------ line (please read the precautions on the back before filling this page) «! 556160 A7 V. Description of the invention () 24 If the bell-type data exists that meets the IP of the master failure data form RL-1", The controller 130 cancels the use right of PM13 by using CDS1 and ends the execution at this time. On the other hand, if the identification information of ID-1 that conforms to the master invalid asset form RL-1 does not exist, the controller 13 column It is determined that CDS1 can use PM13 (ie, record a content), and update the RL-1 and KM-1 with the new invalid data RL-1N and the new unique media key code KM-lN 'received from step S109 (step S114 ). The controller 130 then exchanges at least 'with the media I / F file 6 of CDS1 to share the same session key code KX-2, and transmits it before reading the identification data id-1 from the hidden area 114 of CDS1. So # II &gt; 1 (= KX2 [ID_1]) to PMI3 (step S115). For example, when the conversation key code KK_1 is input into a private key code widely generated algorithm prepared in advance in CDS1 and PM13 ', The value of the session key is the dialog key code KK-2. The controller 130 of the PM13 uses the dialog key code (KX2) to decrypt the KX-2 [ID-1] received from CDS1, and the dialog key code (KX2) is exchanged with the leading key code. Received during the process, and thus obtained the unique ID-1 (step S116). Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. Subsequently, the controller 130 of the PM13 uses the decrypted authentication data of the decrypted CDS1 to refer to the new failure of the open ROM area. Form RL_1N, and determine whether CDS1 should be prevented from using PM13 based on whether there is authentication data that conforms to ID-1 in the invalid data form rl-1 (step si 17). If authentication data that conforms to ID_M exists in the main invalid data form RL If -1N, the controller 13 judges that CDS1 should prohibit the use of PM13 and ends the execution at this time. -27- This paper size applies the Chinese National Standard (CNS) A4 specification (21 × 297 mm) The Intellectual Property Bureau of the Ministry of Economic Affairs Printed by Employee Consumer Cooperative 556160 B7

五、發明説明() 另一方面而言,符合ID-Μ的鑑別資料不存在於主失效 資料表單RL-1N的話,控制器130判定CDS1可使用PM13(即 錄製一内容),I讀取且輸出秘密儲存在隱式R〇M區域135 的獨特媒體鑰匙碼KM-1N(步驟S118)。控制器130隨後與 CDS1的媒體Ι/F部件6交換鑰匙碼’以共享相同的對話鑰 匙碼KX-3,並在利用該對話鑰匙碼!°^3加密已讀取的獨 特主媒體鑰匙碼KM-1N之前,傳送所得已加密鑰匙碼KM_ 1N(=KX3[KM-1N])到CDS1(步驟S119)。例如,當前述對 話鑰匙碼KX2輸入至事先備置在CDS1與PM13的一私密鍮 匙碼產生演算法中時,所得到的結果為該對話鍮匙碼 KX3 〇 CDS1的媒體I/F部件6利用對話鑰匙碼(KX2)解密自 PM13接收的KX3[KM-1N],該對話鑰匙碼(KX3)在前導鑰 匙碼交換過程中接收,並因此取得獨特主媒體鑰匙碼10^-1N(步驟S120) ° 隨後,CDS1的媒體I/F部件6使用獨特媒體鑰匙碼KM-IN來加密秘密儲存在隱式區域Π4的内容鑰匙瑪KC ’並 傳送並傳送所得加密KM-1N[KC]到PM13的隱式RW區域 (步驟S121)。 CDS1的媒體I/F部件6傳送儲存在開放RW區威113的已 加密内容鑰匙碼KC到PM13的開放RW區域(步驟S122) ° 如此一來,本實施例的方法在只有CDS1根據主失效 表單RL-M為無效時,允許CDS1自PM13接收已加密主媒 體鑰匙碼KM-M。儲存在開放R〇M區域114與獨特媒體錄 -28- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)V. Description of the Invention () On the other hand, if the identification data conforming to ID-M does not exist in the master invalidation data form RL-1N, the controller 130 determines that CDS1 can use PM13 (that is, record a content), I read and The unique media key code KM-1N secretly stored in the hidden ROM area 135 is output (step S118). The controller 130 then exchanges the key code 'with the media I / F part 6 of the CDS1 to share the same session key code KX-3, and uses the session key code! ° ^ 3 to encrypt the read unique master media key code KM Before -1N, the obtained encrypted key code KM_1N (= KX3 [KM-1N]) is transmitted to CDS1 (step S119). For example, when the aforementioned dialog key code KX2 is input into a private key code generation algorithm previously prepared in CDS1 and PM13, the result obtained is the dialog key code KX3. The media I / F component 6 of CDS1 uses the dialog The key code (KX2) is decrypted from the KX3 [KM-1N] received from PM13. The dialog key code (KX3) is received during the leading key code exchange process, and a unique master media key code 10 ^ -1N is thus obtained (step S120) ° Subsequently, the media I / F unit 6 of CDS1 uses the unique media key code KM-IN to encrypt the content key MKC 'secretly stored in the hidden area Π4 and transmits and transmits the resulting encrypted KM-1N [KC] to the implicit of PM13. RW area (step S121). The media I / F part 6 of CDS1 transmits the encrypted content key code KC stored in the open RW area via 113 to the open RW area of PM13 (step S122). In this way, the method of this embodiment is only applicable to CDS1 according to the master failure form When RL-M is invalid, CDS1 is allowed to receive the encrypted master media key code KM-M from PM13. Stored in the open ROM area 114 and unique media records -28- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

556160 A7 B7 五、發明說明()26 匙碼KM-1N的新失效資料RL-1利用該獨特媒體鑰匙碼 KM-M加密,並傳送到PM13。 因此’根據主失效表單尺^]^(即嘗試更新PM13的失效 資料的電子裝置)而應該被取消的CDS裝置將無疑地被取 消(排除在外)°如果一裝置已根據失效表單RL4無效的 話,PM13將無法更新該新失效表單尺^丨或獨特媒體鑰匙 碼KM-1N。同樣的,如果CDS1根據新失效表單RL-1N不 為失效的話’只有已加密的獨特媒體鑰匙碼KM-1N能從 PM13被傳輸到CDS1。儲存CDS1的隱式區域114的内容鑰 匙碼KC隨後利用獨特媒體鑰匙碼km_1N被加密並傳送到 ΡΜ13。如此一來,根據新失效表單rl-ΙΝ(即嘗試使用ΡΜ13 的電子裝置)而應該被取消的CDS裝置將無疑地被取消(排 除在外)。 以下將敘述當PD12解密並回放一儲存在PM13的已加 密内容的運作方式。以下的解說將著重於PD12所解密與 回放的内容,相同的程序也用在LCM21解密與回放内容 之情況下。 第12圖顯示介於PM13、PD12與處理流程間的往來。 當使用者指示PD12從PM13回放一内容時,該内容被 載入PD12的媒體I/F部件12f,PD12的CPU12a與PM13的控 制器130對步驟S110施行一相似的相互鑑別(AKE-1)(步驟 S201)。當CDS1與PM13在步驟S201的相互鑑別中發現彼 此都為適當的裝置時,PD12的0?1112&amp;與?]^13的控制器130 交換鑰匙碼以分享相同的對話鑰匙碼KX4。 -29- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製556160 A7 B7 V. Description of the invention () The new invalidation data RL-1 of the 26 key code KM-1N is encrypted with the unique media key code KM-M and transmitted to PM13. Therefore, the CDS device that should be cancelled according to the master failure form rule ^] ^ (that is, the electronic device that attempts to update the PM13 failure information) will undoubtedly be excluded (excluded). If a device has been invalidated according to the failure form RL4, PM13 will not be able to update the new invalid form size ^ or unique media key code KM-1N. Similarly, if CDS1 is not invalidated according to the new invalidation form RL-1N ', only the encrypted unique media key code KM-1N can be transmitted from PM13 to CDS1. The content key key KC of the hidden area 114 where CDS1 is stored is then encrypted using the unique media key code km_1N and transmitted to the PM13. In this way, the CDS device that should be cancelled according to the new invalidation form rl-IN (ie, the electronic device trying to use PM13) will undoubtedly be cancelled (excluded). The operation of when the PD 12 decrypts and plays back an encrypted content stored in the PM 13 will be described below. The following explanation will focus on the content decrypted and played back by PD12. The same procedure is also used when the content is decrypted and played back by LCM21. Figure 12 shows the communication between PM13, PD12 and the processing flow. When the user instructs PD12 to play back a content from PM13, the content is loaded into the media I / F part 12f of PD12. CPU12a of PD12 and controller 130 of PM13 perform a similar mutual authentication (AKE-1) to step S110 (AKE-1) ( Step S201). When CDS1 and PM13 find each other as appropriate devices in the mutual authentication in step S201, 0? 1112 &amp; and? ] ^ 13's controller 130 exchanges the key code to share the same session key code KX4. -29- This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the notes on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs

556160 A7 B7 五、發明說明()27 PD12的CPU12a讀取PD12的鑑別資料1D_PD ’該鑑別 資料隱藏在隱式區域124中,並利用對詁鑰匙碼10^4解密 該鑑別資料ID-PD。媒體I/F部件12f隨後傳送已加密的ID-PD(=KX4[PD])到 PM13(步驟S202)。 PM13的控制器130解密利用對話鑰匙碼10^4自PD12接 收的KX4[ID-PD],該對話鑰匙碼KX4自前導鑰匙碼交換 中接收,以取得ID-PD(步驟S203)。 PM13的控制器130搜尋開放ROM-W區域中失效表單 RL-1N之PD12的已解密鑑別資料ID-PD,iM艮據符合ID-PD 的鑑別資料是否存在,來判定是否應該禁止PD12使用 PM13(步驟S204)。 在失效表單RL-1N中找到符合ID-PD的鑑別資料時, 控制器130判斷PD12應禁止使用PM13(即被取消),並在此 時結束執行。 經濟部智慧財產局員工消費合作社印製 另一方面而言,符合ID-PD的鑑別資料不存在於失效 資料表單RL-1N的話,控制器130判定PD12可使用PM13, 並讀取且輸出秘密儲存在隱式ROM區域135的獨特媒體鑰 匙碼KM-1N(步驟S205)。控制器130隨後與PD12的 CPU12a(藉由PD12的媒體I/F部件12f)交換鑰匙碼,以共享 相同的對話鑰匙碼KX-5。控制器130利用該對話鑰匙碼 KX5加密已讀取的獨特主媒體鑰匙碼KM-1N,並傳送所得 已加密鑰匙碼KM-1N(=KX5[KM-1N])到PD12(步驟S206)。 當前述對話鑰匙碼KX4輸入至事先備置在PD12與PM13的 一私密鑰匙碼產生演算法中時,所得到的結果為該對話鍮 -30- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 556160 A7 B7 五、發明説明() 匙碼KX5 0 PD12的CPU12a利用在前導鑰匙碼交換過程取得的對 話鑰匙碼KX5解密PM13接收的KX5[KM-1N],而取得獨特 媒體鑰匙碼KM-1N(步驟S207) ° 隨後,PD12的CPU12a讀取儲存在PM13的隱式RW區 域136的加密内容鑰匙碼KC,並利用自步驟S207取得的獨 特媒體鑰匙碼KM-1N解密該加密内容鑰匙碼KC。隨後, PD12的CPU12a讀取儲存在PM13的開放RW區域133的加密 内容C (==KC[C])、利用自步驟S208取得的加密内容输匙碼 KC解密該加密内gKC[C]、並回放該内容(步驟S209)。 如此一來,只有在PD12不因著失效表單RL-1N而成為 無效時,本實施例中的方法允許PD12自PM13接收加密獨 特媒體鑰匙碼KM-1N。保密在PM13的隱式區域RW區域的 加密内容鑰匙碼(KM-1N[KC])隨後便利用獨特媒體鑰匙碼 KM-1N解密,並被PD12利用以解密加密内容。如此一來, 應該因著新失效表單RL-1N而無效的PD(即嘗試著利用 PM13的電子裝置)便絕對會失效。 當本發明的著作權保護系統100已根據以上實施例解 釋時,本發明很明顯地不受以上所述細節所限制。 例如,當音樂性著作權數位内容受到本實施例保護 時,電影的影像數據或電腦程式的數據,如遊戲軟體等, 同時也受到保護。 要注意的是,本實施例敘述對話鑰匙碼(KYI或KXI)被 用來加密將要或應該保密在隱式區域的訊息的一事件時, -31- 本紙張尺度適用中國國家標ί (CNS)A4規格(210 X 297公釐) 0 ^^1 ^^1 ^^1 ^^1 I— I _1 IB1 I ·ϋ ϋ i·— I · ^^1 ^^1 ^^1 · mmtm ϋ i^i n —ϋ I I · Λ. · 矣 ^ (請先閱讀背面之注意事項再填寫本頁) 556160 A7 B7 五、發明說明()29 當在CDS1與PM13之間或在PD12與PM13之π德 間傳輪資料 時’加密術便不具備絕對的必要性。然而,利 用對話鑰匙 碼的加密術更能增加内容被保護的安全性。 在本實施例所敘述的主失效表單RL-M與失致表μ 1與RL-1N登錄在開放R〇M區域132或開放R〇]u 區域 中,即使失效表單可能儲存在任一無法被改變的區域中 舉例而言,表單可能儲存在只有利用一個特殊程序才&amp;、 入的隱式區域134中。 以上實施例所敘述的儲存在隱式RW區域的加密八 输匙碼(KM-1N[KC])的一事中,該鑰匙馬可另館存在門放 RW區域133中。 當上述實施例所敘述的一個電子裝置中的鑑別資料從 電子裝置傳輸到錄製媒體,該傳輸並不限於此方向。也就 是說,一錄製媒體可傳輸鑑別資料到一電子裝置中。 例如,一錄製媒體可事先儲存數值E(ID,K1)與數值 E(ID,K2)作為失效資料。該數值E(ID,K1)的取得乃是利用 電子裝置的鑑別資料ID來加密事先決定的第一鑰匙碼 K1,該電子裝置允許進入錄製媒體上的内容。相反地, 該數值E(ID,K2)的取得則是利用電子裝置的鑑別資料1〇來 加密事先決定的第二鑰匙碼K2,該電子裝置被禁止進入 錄製媒體上的内容。 當錄製媒體連接到一電子裝置時,錄製媒體傳送上述 的失效資料E與一隨機數R到該電子裝置。 在接收到失效資料E與一隨機數R時,電子裝置利用自 •32. 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 閱 面 之 篇 I 訂 經濟部智慧財產局員工消費合作社印製 556160 A7 五、發明說明()30 己的鑑別資料解密失效資料E。當電子裝置還未被取消 時,该解密動作導致電子裝置取得第一鑰匙碼£1。相反 地,當電子裝置已被取消,該解密動作導致電子裝置取得 第一鑰匙碼K2。該電子裝置隨後利用加密結果的鑰匙碼 K(K1或K2)來加密隨機數R,並傳送所得數值E(K,R)到錄 製媒體。 該錄製媒體解密收到的數值E(K,R),並比較結果(即 隨數R’)與傳送到電子裝置的隨機數R。當這些數值相符合 時,錄製媒體允許電器用進入内容。此主失效資料可能有 相同的内容且利用相同的程序檢驗,而傳輸電子裝置的夢 別資料的方向則可被反轉。 先 閱 讀 背 面 之 注 項 再i 填( 窝 本 頁 I I 訂 線 經濟部智慧財產局員工消費合作社印製556160 A7 B7 5. Description of the invention (27) The CPU 12a of the PD 12 reads the identification data 1D_PD of the PD 12 'The identification data is hidden in the hidden area 124, and the identification data ID-PD is decrypted using the confrontation key code 10 ^ 4. The media I / F section 12f then transmits the encrypted ID-PD (= KX4 [PD]) to PM13 (step S202). The controller 130 of the PM13 decrypts the KX4 [ID-PD] received from the PD 12 using the session key code 10 ^ 4, and the dialog key code KX4 is received from the leading key code exchange to obtain the ID-PD (step S203). The controller 130 of PM13 searches the decrypted authentication data ID-PD of PD12 of the invalid form RL-1N in the open ROM-W area, and iM determines whether PD12 should be prohibited from using PM13 ( Step S204). When the ID-PD-compliant authentication data is found in the invalidation form RL-1N, the controller 130 determines that PD12 should prohibit the use of PM13 (that is, it is cancelled), and ends the execution at this time. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. On the other hand, if the ID-PD-compliant authentication data does not exist in the invalid data form RL-1N, the controller 130 determines that PD12 can use PM13, and reads and outputs the secret storage. The unique media key code KM-1N in the hidden ROM area 135 (step S205). The controller 130 then exchanges the key code with the CPU 12a of the PD 12 (through the media I / F unit 12f of the PD 12) to share the same session key code KX-5. The controller 130 uses the conversation key code KX5 to encrypt the read unique master media key code KM-1N, and transmits the obtained encrypted key code KM-1N (= KX5 [KM-1N]) to the PD 12 (step S206). When the aforementioned dialog key code KX4 is input into a private key code generation algorithm prepared in advance in PD12 and PM13, the result obtained is the dialog. -30- This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 556160 A7 B7 V. Description of the invention () Key code KX5 0 CPU12a of PD12 uses the conversation key code KX5 obtained during the leading key code exchange process to decrypt the KX5 received by PM13 [ KM-1N] to obtain the unique media key code KM-1N (step S207) ° Subsequently, the CPU 12a of PD12 reads the encrypted content key code KC stored in the hidden RW area 136 of PM13, and uses the unique key obtained from step S207 The media key code KM-1N decrypts the encrypted content key code KC. Subsequently, the CPU 12a of the PD 12 reads the encrypted content C (== KC [C]) stored in the open RW area 133 of PM13, uses the encrypted content key code KC obtained from step S208 to decrypt the encrypted gKC [C], and The content is played back (step S209). In this way, the method in this embodiment allows PD12 to receive the encrypted unique media key code KM-1N from PM13 only when PD12 is not invalidated due to the invalidation form RL-1N. The encrypted content key code (KM-1N [KC]), which is kept secret in the RW area of PM13, is then conveniently decrypted with the unique media key code KM-1N and used by PD12 to decrypt the encrypted content. In this way, a PD that should be invalidated by the new invalidation form RL-1N (ie, an electronic device trying to use PM13) will definitely fail. When the copyright protection system 100 of the present invention has been explained according to the above embodiments, the present invention is obviously not limited by the details described above. For example, when digital content of musical copyright is protected by this embodiment, image data of a movie or data of a computer program, such as game software, is also protected. It should be noted that this embodiment describes an event in which a conversation key code (KYI or KXI) is used to encrypt information that is or should be kept in a hidden area. -31- This paper standard applies to China National Standard (CNS) A4 specification (210 X 297 mm) 0 ^^ 1 ^^ 1 ^^ 1 ^^ 1 I— I _1 IB1 I · ϋ ϋ i · — I · ^^ 1 ^^ 1 ^^ 1 · mmtm ϋ i ^ in —ϋ II · Λ. · 矣 ^ (Please read the notes on the back before filling out this page) 556160 A7 B7 V. Description of the invention () 29 When it is passed between CDS1 and PM13 or between π and PD12 and PM13 Encryption is not absolutely necessary when it comes to data rotation. However, encryption using session key codes can increase the security of the content being protected. In the main invalidation form RL-M and the misstatement form μ 1 and RL-1N described in this embodiment, they are registered in the open ROM area 132 or the open ROM area, even though the invalidation form may be stored in any one that cannot be changed. For example, the form may be stored in an implicit area 134 that is only accessed by a special program. In the case of the encrypted eight key code (KM-1N [KC]) stored in the implicit RW area described in the above embodiment, the key may be stored in the doorway RW area 133 separately. When the authentication data in an electronic device described in the above embodiment is transmitted from the electronic device to the recording medium, the transmission is not limited to this direction. That is, a recording medium can transmit authentication data to an electronic device. For example, a recording medium may store the values E (ID, K1) and E (ID, K2) in advance as invalidation data. The value E (ID, K1) is obtained by using the identification data ID of the electronic device to encrypt the first key code K1 determined in advance. The electronic device allows access to the content on the recording medium. Conversely, the value E (ID, K2) is obtained by using the identification data 10 of the electronic device to encrypt the second key code K2 determined in advance, and the electronic device is prohibited from accessing the content on the recording medium. When the recording medium is connected to an electronic device, the recording medium transmits the above-mentioned invalidation data E and a random number R to the electronic device. When receiving the invalidation data E and a random number R, the electronic device is used since 32. This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm). Read the article I. Order Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the employee consumer cooperative 556160 A7 V. Description of the invention (30) The identification data E has been decrypted. When the electronic device has not been cancelled, the decryption action causes the electronic device to obtain the first key code of £ 1. Conversely, when the electronic device has been cancelled, the decryption action causes the electronic device to obtain the first key code K2. The electronic device then encrypts the random number R using the key code K (K1 or K2) of the encryption result, and transmits the obtained value E (K, R) to the recording medium. The recording medium decrypts the received value E (K, R) and compares the result (i.e., the random number R ') with the random number R transmitted to the electronic device. When these values match, the recording medium allows appliances to access the content. The master failure data may have the same content and be tested using the same procedure, and the direction of transmitting dream data of the electronic device may be reversed. Please read the note on the back first and then fill in the (I) on this page.

556160 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明()31 元件標號對照表 第1圖 12 可攜式錄製/回放裝置(稱 1 内容分散系統 可攜式裝置) 12 可攜式錄製/回放裝置(稱 13 儲存媒體 可攜式裝置) 14 失效資料接收部件 13 内容使用控制系統(可攜 15 使用者I/F部件 式媒體) 16 失效資料儲存部件 21 内容使用控制系統(特許 40 電子音樂分配器 依從模組) 41 失效資料特許實體 100 著作權保護系統 第3圖 第2圖 PM 錄製媒體 CDS 内容分散系統 13 儲存媒體 EMD 電子音樂分配器 130 控制器 PM 儲存媒體 131 開放區域 PD 錄製/回放裝置 132 唯讀開放區域 SMS 保全音樂伺服器 133 可逆寫開放區域 2 保全音樂伺服器SMS 134 隱式區域 3 EMDJ/F(介面)部件 135 隱式ROM區域 5 PDJ/F部件 136 隱式可逆寫RW區域136 6 媒體_I/F部件 CDS/PD 内容分散系統/錄 7 隱式區域驅動器 製與回放裝置 8 登錄儲存部件 第4圖 9 特許儲存部件 132 唯讀開放區域 10 音樂數據儲存部件 132a 開放ROM_W區域 -34- (請先閱讀背面之注意事項再填寫本頁) 訂---------線 « 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 556160 A7 B7 經濟部智慧財產局員工消費合作社印製 發明說明()32 RL-M 主失效資料 第7圖 RL-1 第一組失效資料 PD 可攜式錄製/回放裝置(稱 RL-2 第二組失效資料 可攜式裝置) 第5圖 12 可攜式錄製/回放裝置(稱 CDS 内容分散系統 可攜式裝置) 1 内容分散系統 121 開放區域 111 開放區域 122 開放ROM區域 112 開放ROM區域 123 開放RW區域 113 開放RW區域 124 隱式區域 114 隱式區域 第8圖 第6圖 LCM 特許依從模組 PD 錄製/回放裝置(可攜式裝 置) 12 可攜式錄製/回放裝置(稱 可攜式裝置) 12a 中央處理器CPU 13 儲存媒體PM 12b 隨機快取記憶體RAM 21 内容使用控制系統(特許 12c 唯讀記憶體ROM 依從模組) 12d 快閃記憶體 22 保全音樂伺服器SMS 12e 外部用品I/F部件 23 EMDJ/F部件 12f 媒體I/F部件 25 PD_I/F部件 12g 解調部件 26 媒體I/F部件 12h 解碼器部件 27 隱式區域驅動器 12i D/A變頻器部件 28 登錄儲存部件 CDS1 内容分散系統 29 特許儲存部件 PM13錄製媒體 30 音樂數據儲存部件 —35- (請先閱讀背面之注意事項再填寫本頁) -----:----訂---------線』 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 556160 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明()33 31 CD_I/F部件 AKE-M主要識別與鑰匙碼交換 EMD 電子音樂分配器 AKE- 1相互鑑別 第9圖 KY1 對話鑰匙碼 LCM 特許依從模組 KY2 對話鑰匙碼 21 内容使用控制系統(特許 KX1 對話鑰匙碼 依從模組) E 數值 211 開放區域 S101 步驟101 212 開放ROM區域 S103 步驟103 213 開放RW區域 S104 步驟104 214 隱式區域 S105 步驟105 第10圖 S106 步驟106 CDS 内容分散系統 S107 步驟107 PM 錄製媒體 S108 步驟108 ID-M 主鑑別資料 S109 步驟109 ID-1 主鑑別資料 S110 步驟110 RL-M主失效資料 Sill 步驟111 RL-1 失效資料 S112 步驟112 RL-1N新失效資料 S113 步驟113 Kl-M鑑別鑰匙碼 S114 步驟114 KM-1N新獨特媒體鑰匙碼 KM-M鑑別鑰匙碼 -36- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁)556160 Printed by A7 B7, Consumer Cooperatives, Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the Invention () 31 Component No. Cross Reference Table 1 Figure 12 Portable Recording / Playback Device (referred to as 1 Content Dispersion System Portable Device) 12 Portable Recording / playback device (referred to as 13 storage media portable device) 14 Invalid data receiving unit 13 Content use control system (Portable 15 user I / F component media) 16 Invalid data storage unit 21 Content use control system (license 40 Electronic music distributor compliance module) 41 Invalid data Licensed entity 100 Copyright protection system Figure 3 Figure 2 PM Recording media CDS Content distribution system 13 Storage media EMD Electronic music distributor 130 Controller PM Storage media 131 Open area PD recording / Playback device 132 Read-only open area SMS security music server 133 Reversible write open area 2 Security music server SMS 134 Implicit area 3 EMDJ / F (interface) component 135 Implicit ROM area 5 PDJ / F component 136 Implicit reversible write RW area 136 6 Media_I / F component CDS / PD Content distribution system / Record 7 Implicit area drive And playback device 8 Register the storage unit Figure 4 Figure 9 License storage unit 132 Read-only open area 10 Music data storage unit 132a Open ROM_W area -34- (Please read the precautions on the back before filling this page) Order ----- ---- Line «This paper size is applicable to Chinese National Standard (CNS) A4 (210 X 297 mm) 556160 A7 B7 Printed Invention Note by Employee Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs () 32 RL-M Master Failure Information Section 7 Figure RL-1 The first group of invalid data PD portable recording / playback device (called RL-2 The second group of invalid data PD portable device) Figure 5 12 The portable recording / playback device (called CDS content distribution system) Portable device) 1 Content distribution system 121 Open area 111 Open area 122 Open ROM area 112 Open ROM area 123 Open RW area 113 Open RW area 124 Hidden area 114 Hidden area Figure 8 Figure 6 LCM License Compliance Module PD recording / playback device (portable device) 12 portable recording / playback device (called portable device) 12a central processing unit CPU 13 storage medium PM 12b random cache memory RAM 21 Content use control system (licensed 12c read-only ROM ROM compliance module) 12d flash memory 22 secure music server SMS 12e external I / F unit 23 EMDJ / F unit 12f media I / F unit 25 PD_I / F Part 12g Demodulation part 26 Media I / F part 12h Decoder part 27 Hidden area driver 12i D / A inverter part 28 Registration storage part CDS1 Content distribution system 29 Licensed storage part PM13 recording media 30 Music data storage part—35- (Please read the precautions on the back before filling this page) -----: ---- Order --------- Line "This paper size applies to China National Standard (CNS) A4 (210 X 297mm) 556160 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention () 33 31 CD_I / F part AKE-M mainly identifies and key code exchanges EMD Electronic music distributor AKE-1 mutual identification 9th Figure KY1 Dialogue Key Code LCM License Compliance Module KY2 Dialogue Key Code 21 Content Use Control System (Privileged KX1 Dialogue Key Code Compliance Module) E Value 211 Open area S101 Step 101 212 Open ROM area S103 Step 103 213 Open RW area S104 Step 104 214 Hidden area S105 Step 105 Figure 10 S106 Step 106 CDS content distribution system S107 Step 107 PM Recording media S108 Step 108 ID-M master authentication information S109 Step 109 ID-1 master authentication information S110 Step 110 RL-M master failure information Sill Step 111 RL-1 failure information S112 Step 112 RL-1N new failure information S113 Step 113 Kl-M authentication key code S114 Step 114 KM-1N new unique media key code KM-M authentication Key code -36- This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page)

Claims (1)

6 5 5 60 影 面 X年 修 A B c D 專 士一 CZ 、一r 申 脅 補 第89122735號申請案申請專利範圍修正本 92.3.3. 1. 一種供載入電子裝置使用之儲存媒體,該儲存媒體包 含: 一用以儲存數位内容的内容儲存區; 一用以儲存對應於電子裝置之識別資料的資料作為失 效資料的失效資料儲存區’該識別資料防止存取储存 於内容儲存區中的數位内容;以及 一用以儲存對應於一電子裝置的識別資料的資料的主 失效資料儲存區,該識別資料防止更新儲存於失效資 料儲存區中的失效資料。 2. 根據申請專利範圍第1項之儲存媒體,其另包含: 一用以執行第一判斷的内容保護方法,它判斷已安裝 儲存媒體的一電子裝置是否擁有對應儲存於失效資料 儲存區的失效資料的鑑別資料,當第一判斷的結果呈 否定時,該内容保護部件允許電子裝置進入儲存在内 容儲存資料區的數位内容;以及 一用以執行第二判斷的失效資料更新方法,它判斷已 安裝儲存媒體的一電子裝置是否擁有對應儲存於主失 效資料儲存區的主失效資料的鑑別資料,當第二判斷 結果呈否定時,該更新部件允許電子裝置更新儲存在 失效資料儲存資料區的失效資料。 3. 根據申請專利範圍第2項之儲存媒體,主失效資料儲 存區可備置在ROM(唯讀記憶體),其中該主失效資料 已事先被儲存。 __ 本紙張尺度適用中國國家標準(CNS) A4規格(210X297公釐) 8 8 8 8 A B CD 556160 I六、申請專利範圍 4. 根據申請專利範圍第2項之儲存媒體,其另包含: 一用以在失效資料更新部件執行第二判斷前,利用已 安裝儲存媒體的一電子裝置執行互相鑑別的互相鑑別 部件,並且當互相鑑別成功時,該互相鑑別部件也製 造一能與電子裝置共享的私密鑰匙碼,其中,該失效 資料更新部件利用以互相鏗別部件製造的私密鑰匙碼 更新失效資料。 5. 根據申請專利範圍第2項的儲存媒體,其中,唯有當 第二判斷結果呈否定時,失效資料更新部件可傳送電 子裝置必須更新失效資料的一私密鑰匙碼到該電子裝 置。 6. 根據申請專利範圍第2項之儲存媒體,其中失效資料 可分類成數個群組,而失效資料儲存區可包含多個儲 存區,每個群組被儲存在不同的儲存區中,而失效資 料更新部件可判斷以下情況做為第二判斷: (1) 安裝了儲存媒體的電子裝置是否擁有不對應於 儲存於主失效資料儲存區域的主失效資料的識 別資料; (2) 該電子裝置是否擁有不對應於電子裝置希望更 新的失效資料的特定組群中的識別資料; 只有在當(1)與(2)都是肯定的答案時,第二判斷才是否 定的,而失效資料更新部件只允許電子裝置更新特定 群組中的失效資料。 7. 根據申請專利範圍第2項之儲存媒體,該儲存媒體的 __ -38·_ 炎度適用中國國家標準( CNS ) A4規格(210X297公釐) A B c D 556160 ττ、申請專利範圍 失效資料區域儲存一剛利用加密之事先決定的私密鑰 匙碼而被製造的資料作為作為失效資料,該私密鑰匙 碼利用被禁止進入數位内容之電子裝置中的鑑別資料 作為一鑰匙碼, 内容保護構件傳輸儲存於失效資料儲存區域的失效資 料到電子裝置上,該電子裝置已載入儲存媒體,並且 判斷電子裝置回覆的資料是否發揮了一事先決定的正 規,以決定該電氣用品是否擁有對應儲存於失效資料 儲存區的失效資料的鑑別資料, 主失效資料區域儲存一剛利用加密之事先決定的私密 鑰匙碼而被製造的資料作為作為主失效資料,該私密 鑰匙碼利用被禁止更新失效資料之電子裝置中的鑑別 資料作為一输匙碼, 該失效資料更新構件傳輸儲存於主失效資料儲存區域 的主失效資料到電子裝置上,並且判斷電子裝置回覆 的資料是否發揮了一事先決定型態的正規,以決定該 電氣用品是否擁有對應儲存於主失效資料儲存區的主 失效資料的鑑別資料。 8. —種更新儲存媒體上的失效資料之失效資料更新方 法,該儲存媒體係供載入一電子裝置使用並且包括: (1)一用以儲存數位内容的内容儲存區;(2)—用以儲存 對應於電子裝置的識別資料的資料的失效資料儲存 區,該電子裝置被禁止存取儲存於内容儲存區中的數 位内容;以及(3)—用以儲存對應於一電子裝置的識別 ____ 未Ϊ氏張尺度適用中國國家標準(CNS) A4規格(210X297公釐) '~ 8 8 8 8 A B CD 556160 六、申請專利範圍 資料的資料的主失效資料儲存區,該電子裝置被禁止 更新儲存於失效資料儲存區中的失效資料; 該方法包含: 一用以檢測儲存媒體是否已安裝到電子裝置的檢測步 驟, 一用以判斷電子裝置的第一鑑別資料是否不對應於儲 存在儲存媒體的主失效資料儲存區的主失效資料的第 一判斷的步驟;以及 唯有當第一判斷結果呈肯定時,一用以更新儲存在失 效資料儲存區的失效資料的更新步驟。 9. 如申請專利範圍第8項之失效資料更新方法,其中更 新步驟有一種對應於一電子裝置的第二鑑別資料的資 料,該第二鑑別資料儲存在失效資料儲存區域,作為 新失效資料。 10. 如申請專利範圍第9項之失效資料更新方法,其另包 含: 一相互鑑別步驟,其中在電子裝置與儲存媒體之間執 行互相鑑別,只有互相鑑別成功時,一即將被電子裝 置與儲存媒艎共享的私密鑰匙碼才能被製造, 其中更新步驟利用相互鑑別步驟所產生的私密鑰匙碼 更新該失效資料。 11. 如申請專利範圍第10項之失效資料更新方法,其中更 新步驟包含: 當第一判斷結果呈肯定時,利用相互鑑別步驟所產生 -40- 紙張尺度適用中國國家標準(CNS) A4規格(210X297公釐) 5561606 5 5 60 Shadow X years repair AB c D Specialist 1 CZ, 1 r Application for threatening application No. 89122735 Application for revision of patent scope 92.3.3. 1. A storage medium for loading electronic devices, the The storage medium includes: a content storage area for storing digital content; a invalidation data storage area for storing data corresponding to identification data of the electronic device as invalidation data; the identification data prevents access to the content stored in the content storage area; Digital content; and a main invalidation data storage area for storing data corresponding to identification data of an electronic device, the identification data preventing update of the invalidation data stored in the invalidation data storage area. 2. The storage medium according to item 1 of the scope of patent application, further comprising: a content protection method for performing the first judgment, which determines whether an electronic device having the storage medium installed has a failure corresponding to the failure data storage area; The identification information of the data. When the result of the first judgment is negative, the content protection component allows the electronic device to access the digital content stored in the content storage data area; and a method for updating the invalid data for performing the second judgment, which judges that the Does an electronic device on which the storage medium is installed have identification data corresponding to the master failure data stored in the master failure data storage area? When the second judgment result is negative, the update component allows the electronic device to update the failure stored in the failure data storage data area. data. 3. According to the storage medium in the scope of patent application No. 2, the master invalidation data storage area can be set in ROM (read-only memory), where the master invalidation data has been stored in advance. __ This paper size is in accordance with Chinese National Standard (CNS) A4 (210X297 mm) 8 8 8 8 AB CD 556160 I 6. Application scope of patent 4. According to the storage medium of item 2 of the scope of patent application, it also contains: Before performing the second judgment of the invalid data update component, the mutual authentication component using the electronic device having the storage medium installed to perform mutual authentication, and when the mutual authentication is successful, the mutual authentication component also creates a privacy that can be shared with the electronic device. The key code, in which the revocation data updating part updates the revocation data by using a private key code manufactured from a mutually different part. 5. According to the storage medium of the scope of patent application No. 2, among them, only when the second judgment result is negative, the revocation data updating part can transmit a private key code of the electronic device to the renewal data to the electronic device. 6. According to the storage medium of the scope of the patent application, the invalidation data can be classified into several groups, and the invalidation data storage area can include multiple storage areas. Each group is stored in a different storage area and becomes invalid. The data update component can judge the following situations as the second judgment: (1) Does the electronic device on which the storage medium is installed have identification data that does not correspond to the master failure data stored in the master failure data storage area; (2) Whether the electronic device Have identification data in a specific group that does not correspond to the invalidation data that the electronic device wishes to update; the second judgment is negative only when both (1) and (2) are affirmative, and the invalidation data update component Only allow electronic devices to update stale data in specific groups. 7. According to the storage medium in the scope of patent application No. 2, the __ -38 · _ inflammation of the storage medium applies the Chinese National Standard (CNS) A4 specification (210X297 mm) AB c D 556160 ττ, the patent application scope invalidation data The area stores a piece of data that has just been manufactured using the encrypted private key code determined in advance as invalid data. The private key code uses the authentication data in the electronic device that is prohibited from entering digital content as a key code, and the content protection component is transmitted and stored. The failure data in the failure data storage area is stored on the electronic device, and the electronic device has been loaded with the storage medium, and it is determined whether the data returned by the electronic device has played a predetermined role in order to determine whether the electrical appliance has a corresponding stored in the failure data Identification data of invalid data in the storage area. The main invalid data area stores a piece of data that has just been manufactured using the encrypted private key code determined in advance as the master invalid data. The private key code is used in an electronic device that is prohibited from updating the invalid data. The authentication information as a key code should be invalid The material update component transmits the main failure data stored in the main failure data storage area to the electronic device, and judges whether the data returned by the electronic device has played a predetermined form of formality to determine whether the electrical appliance has the corresponding storage stored in the main failure. Identification of the master failure data in the data store. 8.-A method for updating invalid data for updating invalid data on a storage medium, the storage medium being used for loading an electronic device and including: (1) a content storage area for storing digital content; (2)-use An invalid data storage area for storing data corresponding to the identification data of the electronic device, the electronic device is prohibited from accessing the digital content stored in the content storage area; and (3) —for storing the identification corresponding to an electronic device_ ___ Applicable to Chinese National Standard (CNS) A4 specification (210X297 mm) for non-Zhang's scale. '~ 8 8 8 8 AB CD 556160 VI. The main invalid data storage area of the data for patent application data, the electronic device is prohibited from updating The invalidation data stored in the invalidation data storage area; the method includes: a detection step for detecting whether the storage medium is installed in the electronic device, and a method for determining whether the first authentication data of the electronic device does not correspond to the storage in the storage medium The first judgment step of the master failure data of the master failure data storage area; and only when the first judgment result is positive, a In updating step to update the stored failure information of the failure data store. 9. For the method for updating invalidation data in the scope of patent application item 8, wherein the updating step includes a second authentication data corresponding to an electronic device, the second authentication data is stored in the invalidation data storage area as the new invalidation data. 10. If the invalidation data updating method of item 9 of the patent application scope further includes: a mutual authentication step, in which mutual authentication is performed between the electronic device and the storage medium, and only when the mutual authentication is successful, the electronic device and the storage are about to be Only the private key code shared by the media player can be manufactured, and the updating step updates the invalidation data by using the private key code generated by the mutual authentication step. 11. If the invalidation data updating method of item 10 of the scope of patent application is applied, the updating step includes: when the first judgment result is positive, the -40- paper size produced by the mutual authentication step is applicable to the Chinese National Standard (CNS) A4 specification ( 210X297 mm) 556 160 的私密鑰匙碼來加密對應於一電子裝置之第二鑑別資 料的資料並使被加密資料自電子裝置傳輸置儲存媒體 的傳輪子步驟;以及 利用私密鑰匙碼,用以解密被傳輸已加密資料的儲存 子步驟,以及用以在失效資料儲存區域中儲存資料作 為新失效資料的儲存子步驟。 12·如申請專利範圍第9項之失效資料更新方法,其中判 斷步驟包含了一用以對判斷第二鑑別資料是否對應於 儲存於失效資料儲存區域中執行第三判斷的判斷子步 驟,以及 箠第一判斷結果呈肯定時而第三判斷呈否定時,更新 步驟中有第二鑑別資料,該第二鑑別資料儲存在失效 資料儲存區中作為新失效資料。 13·如申請專利範圍第9項之失效資料更新方法,其中主 失效資料區域儲存一剛利用加密之特別私密鑰匙碼而 被製造的資料作為作為主失效資料,該特別私密鑰匙 碼利用被禁止更新失效資料之電子裝置中的鑑別資料 作為一錄匙碼,並且 判斷步驟傳輸儲存於主失效資料儲存區域的主失效資 料到電子裝置上,該電子裝置已被載入儲存媒體,也 判斷電子裝置的鑑別資料是否對應於儲存儲存媒體中 的主失效資料限制區的主失效資料,更判斷自電子裝 置接收的回覆是否發揮了一事先決定型態的正規。 14· 一種用以更新儲存媒體上的失效資料之失效資料更新 -41- 本紙張尺度適用中關家標準(CNS) A4規格Ui〇X297公楚) --—- A B c D 556160 六、申請專利範圍 裝置,該儲存媒體係供載入電子裝置使用且包含:(1) 一用以儲存數位内容的内容儲存區;(2)—用以儲存對 應於電子裝置的識別資料的資料的失效資料儲存區, 該電子裝置被禁止存取儲存於内容儲存區中的數位内 容;以及(3)—用以儲存對應於一電子裝置的識別資料 的資料的主失效資料儲存區,該電子裝置被禁止更新 儲存於失效資料儲存區中的失效資料; 該失效資料更新裝置包含: 一用以儲存不對應於儲存在儲存媒體之主失效資料儲 存區的主限制區域的第一鏗別資料儲存構件; 一用以取得與使用對應於儲存在第一鑑別資料區域構 件中的第一鑑別資料的許可取得構件,該許可來自儲 存媒體以更新儲存在儲存媒體上的失效資料;以及 一更新構件,用以根據許可取得構件取得之許可更新 儲存在儲存媒體的失效資料。 15. 如申請專利範圍第14項之失效資料更新裝置,其中更 新構件利用事先儲存且對應於第二鑑別資料的資料來 更新失效資料。 16. 如申請專利範圍第15項之失效資料更新裝置,其另包 含: 在許可取得構件試著取得更新失效資料的許可前,一 用以與儲存媒體執行互相鑑別的相互鑑別構件;只有 互相鑑別已成功時,該相互鑑別構件可製造能被儲存 媒體共享的私密鑰匙碼* ^紙張用中國國家標準(CNSy A4^格(210&gt;&lt;:297公釐) -42- A B c D 556160 六、申請專利範圍 在該儲存媒體中,更新步驟利用相互鑑別步驟所產生 的私密餘匙碼更新該失效資料。 17. 如申請專利範圍第16項之失效資料更新裝置,其另包 含: 該更新構件利用相互鑑別步驟所產生的私密鑰匙碼, 藉由加密對應於第二鑑別資料的新失效資料來更新失 效資料,並且將已加密資料從電子裝置傳輸到儲存媒 體。 18. 如申請專利範圍第15項之失效資料更新裝置, 其中該失效資料被分成多個組群,且失效資料儲存區 包含多個儲存區,每個儲存區儲存一種不同的組群, 該更新構件只更新一組群中的失效資料,其對應於第 二鑑別資料。 19. 如申請專利範圍第15項之失效資料更新裝置,其中主 失效資料區域儲存一藉由加密事先決定之私密鑰匙碼 而被製造的資料作為作為主失效資料,該事先私密鑰 匙碼利用被禁止更新失效資料之電子裝置中的鑑別資 料作為一输匙碼,並且 許可取得構件藉由接收傳送自儲存媒體的主失效資料 來取得許可、利用一電子裝置中的第一鑑別資料來解 密主失效資料,並傳送發揮一事先決定型態的正規的 一已解密結果與資料到該儲存媒體。 __________-43- 本紙張尺度遗用中國國家標单( CNS )~X4規格(210^297公釐)A private key code to encrypt the data corresponding to the second authentication data of an electronic device and to transfer the encrypted data from the electronic device to a storage medium; and a private key code to decrypt the encrypted data transmitted A storage sub-step, and a storage sub-step for storing data in the stale data storage area as new stale data. 12. The invalidation data updating method according to item 9 of the scope of patent application, wherein the judging step includes a judging sub-step for performing a third judgment on whether the second authentication data corresponds to the stored in the invalidation data storage area, and 箠When the first judgment result is positive and the third judgment is negative, there is a second authentication data in the updating step, and the second authentication data is stored in the invalid data storage area as the new invalid data. 13. If the invalidation data update method of item 9 of the scope of patent application, the main invalidation data area stores a piece of data that has just been manufactured using the encrypted special private key code as the main invalidation data, and the use of the special private key code is prohibited from being updated The identification data in the electronic device of the failure data is used as a key code, and the judgment step transmits the master failure data stored in the main failure data storage area to the electronic device, the electronic device has been loaded into the storage medium, and the The identification data corresponds to the main failure data in the main failure data limitation area in the storage medium, and it is further determined whether the response received from the electronic device plays a predetermined form. 14 · An invalidated data update for updating invalidated data on storage media -41- This paper standard is applicable to Zhongguanjia Standard (CNS) A4 specification Ui〇297297) ----- AB c D 556160 Range device, the storage medium is used for loading the electronic device and includes: (1) a content storage area for storing digital content; (2)-invalid data storage for storing data corresponding to the identification data of the electronic device Area, the electronic device is prohibited from accessing digital content stored in the content storage area; and (3) —a master invalid data storage area for storing data corresponding to identification data of an electronic device, the electronic device is prohibited from updating The invalidation data stored in the invalidation data storage area; the invalidation data updating device includes: a first type data storage component for storing a primary restriction area that does not correspond to the main invalidation data storage area stored in the storage medium; To obtain and use a license acquisition component corresponding to the first authentication data stored in the first authentication data area component, the permission from the storage medium To update the invalidation data stored on the storage medium; and an update component to update the invalidation data stored on the storage medium according to the permission obtained by the license acquisition component. 15. For the invalidation data updating device of the scope of application for patent No. 14, wherein the updating component updates the invalidation data by using the data stored in advance and corresponding to the second authentication data. 16. If the invalidation data updating device of the scope of application for patent No. 15 further includes: a mutual authentication component for performing mutual authentication with the storage medium before the license acquisition component attempts to obtain a permission to update the invalidation data; only mutual authentication When successful, the mutual authentication component can produce a private key code that can be shared by storage media * ^ Chinese national standard for paper (CNSy A4 ^ format (210 &gt; &lt;: 297 mm) -42- AB c D 556160 VI. In the storage medium, the update step uses the private key code generated by the mutual authentication step to update the invalidation data. 17. If the invalidation data update device of the 16th patent application range includes: The private key code generated in the mutual authentication step updates the invalidation data by encrypting the new invalidation data corresponding to the second authentication data, and transmits the encrypted data from the electronic device to the storage medium. Device for updating invalid data, wherein the invalid data is divided into multiple groups, and the invalid data storage area contains multiple Storage area, each storage area stores a different group, and the update component only updates the invalidation data in one group, which corresponds to the second identification data. The master invalid data area stores a piece of data manufactured by encrypting a previously determined private key code as the master invalid data. The prior private key code uses the authentication data in the electronic device forbidden to update the invalid data as a key code. And the permission obtaining component obtains the permission by receiving the master invalidation data transmitted from the storage medium, using the first authentication data in an electronic device to decrypt the master invalidation data, and transmitting a regular, decrypted form that plays a predetermined pattern Results and information to this storage medium. __________- 43- This paper standard uses China National Standards (CNS) ~ X4 specifications (210 ^ 297 mm)
TW089122735A 1999-11-08 2000-10-27 Revocation information updating method, revocation information updating apparatus and storage medium TW556160B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/436,035 US6850914B1 (en) 1999-11-08 1999-11-08 Revocation information updating method, revocation informaton updating apparatus and storage medium

Publications (1)

Publication Number Publication Date
TW556160B true TW556160B (en) 2003-10-01

Family

ID=23730835

Family Applications (1)

Application Number Title Priority Date Filing Date
TW089122735A TW556160B (en) 1999-11-08 2000-10-27 Revocation information updating method, revocation information updating apparatus and storage medium

Country Status (7)

Country Link
US (3) US6850914B1 (en)
EP (1) EP1098311B1 (en)
JP (1) JP3312024B2 (en)
KR (1) KR100729901B1 (en)
CN (1) CN1203413C (en)
DE (1) DE60001478T2 (en)
TW (1) TW556160B (en)

Families Citing this family (66)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6601046B1 (en) * 1999-03-25 2003-07-29 Koninklijke Philips Electronics N.V. Usage dependent ticket to protect copy-protected material
JP4621314B2 (en) * 1999-06-16 2011-01-26 株式会社東芝 Storage medium
US7636843B1 (en) 1999-08-20 2009-12-22 Sony Corporation Information transmission system and method, drive device and access method, information recording medium, device and method for producing recording medium
US6850914B1 (en) 1999-11-08 2005-02-01 Matsushita Electric Industrial Co., Ltd. Revocation information updating method, revocation informaton updating apparatus and storage medium
WO2001052125A1 (en) * 2000-01-14 2001-07-19 Marconi Commerce Systems Inc. A data retail system
JP4617533B2 (en) * 2000-03-14 2011-01-26 ソニー株式会社 Information providing apparatus and method, information processing apparatus and method, and program storage medium
JP2001352321A (en) * 2000-04-06 2001-12-21 Sony Corp Information processing system, information processing method, and information recording medium, and program providing medium
JP2001312374A (en) * 2000-04-28 2001-11-09 Fujitsu Ltd Storage device and access control method
JP4608749B2 (en) * 2000-07-24 2011-01-12 ソニー株式会社 Data processing apparatus, data processing method, license system, and program providing medium
JP2002132585A (en) * 2000-10-20 2002-05-10 Sony Corp Information recording apparatus, information reproducing apparatus, information recording medium, information recording method, information reproducing method, and program providing medium
AUPR321701A0 (en) * 2001-02-20 2001-03-15 Millard, Stephen R. Method of licensing content on updatable digital media
JP2002319932A (en) * 2001-04-19 2002-10-31 Sony Corp Device and method for recording information, device and method for reproducing information, and program
TWI240250B (en) * 2001-07-09 2005-09-21 Matsushita Electric Ind Co Ltd Content management system and information recording medium
EP1288942B1 (en) * 2001-08-08 2005-01-12 Matsushita Electric Industrial Co., Ltd. Copyright protection system, recording device, and reproduction device
US7729495B2 (en) * 2001-08-27 2010-06-01 Dphi Acquisitions, Inc. System and method for detecting unauthorized copying of encrypted data
US20030188183A1 (en) * 2001-08-27 2003-10-02 Lee Lane W. Unlocking method and system for data on media
WO2003019438A2 (en) * 2001-08-28 2003-03-06 Koninklijke Philips Electronics N.V. Consumer and revocation of their equipment
US7496764B2 (en) * 2001-09-12 2009-02-24 Nagravision S.A. Data transmission method between a local server and local peripherals
FR2829892A1 (en) * 2001-09-14 2003-03-21 St Microelectronics Sa Secure distribution system for music or documents includes provision of identifiable smart card to each recipient, and decryption key available to recognized smart cards
KR20040039443A (en) * 2001-09-27 2004-05-10 마쯔시다덴기산교 가부시키가이샤 An encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device
WO2003038567A2 (en) * 2001-11-01 2003-05-08 Mattel, Inc. Digital audio device
JP3485911B2 (en) * 2001-12-17 2004-01-13 シャープ株式会社 Data usage restriction setting method, data usage restriction setting device, data usage restriction setting program, and recording medium recording the program
US20030233563A1 (en) * 2002-01-23 2003-12-18 Sky Kruse Method and system for securely transmitting and distributing information and for producing a physical instantiation of the transmitted information in an intermediate, information-storage medium
US7340603B2 (en) * 2002-01-30 2008-03-04 Sony Corporation Efficient revocation of receivers
AU2003224457A1 (en) * 2002-05-09 2003-11-11 Matsushita Electric Industrial Co., Ltd. Authentication communication system, authentication communication apparatus, and authentication communication method
CN1666460A (en) * 2002-05-09 2005-09-07 松下电器产业株式会社 Public key certificate revocation list generation apparatus, revocation judgement apparatus, and authentication system
DE60323182D1 (en) * 2002-06-11 2008-10-09 Matsushita Electric Ind Co Ltd authentication system
JP4115175B2 (en) * 2002-06-28 2008-07-09 富士通株式会社 Information storage device, information processing device, specific number creation method, specific number creation program
CN1512357A (en) * 2002-12-30 2004-07-14 �ʼҷ����ֵ��ӹɷ����޹�˾ Method and system for increasing optical disc copy system extension property
EP1588365A2 (en) * 2003-01-15 2005-10-26 Koninklijke Philips Electronics N.V. Embedded revocation messaging
EP1623302A4 (en) * 2003-03-18 2012-11-21 Networks Dynamics Inc Network operating system and method
JP4043388B2 (en) * 2003-03-20 2008-02-06 ソニー株式会社 Playback apparatus and playback method
KR100676004B1 (en) 2003-03-26 2007-01-30 마츠시타 덴끼 산교 가부시키가이샤 Revocation information transmission method, reception method, and device thereof
JP2004295373A (en) * 2003-03-26 2004-10-21 Sony Corp Information recording medium, information processor, information recording medium manufacturing device and method, and computer program
JP2004302921A (en) * 2003-03-31 2004-10-28 Toshiba Corp Device authenticating apparatus using off-line information and device authenticating method
US20040205345A1 (en) * 2003-04-11 2004-10-14 Ripley Michael S. System for identification and revocation of audiovisual titles and replicators
JP4222110B2 (en) * 2003-05-28 2009-02-12 ソニー株式会社 Information recording medium, information processing apparatus and method
KR101148497B1 (en) * 2003-08-05 2012-05-21 파나소닉 주식회사 Copyright protection system
KR20060126471A (en) * 2003-10-29 2006-12-07 마츠시타 덴끼 산교 가부시키가이샤 Game system, game execution apparatus, and portable storage medium
CA2528230A1 (en) * 2003-12-02 2005-06-16 Supersonica S.R.L. Process and system for storing managing displaying and protecting multimedia contents on external storage units
KR101043336B1 (en) * 2004-03-29 2011-06-22 삼성전자주식회사 Method and apparatus for acquiring and removing informations of digital right objects
US7617536B2 (en) * 2004-12-13 2009-11-10 Panasonic Corporation Unauthorized device detection device, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method
WO2006069274A2 (en) * 2004-12-21 2006-06-29 Sandisk Corporation Versatile content control with partitioning
EP1831831A4 (en) * 2004-12-22 2009-04-01 Certicom Corp Partial revocation list
US7822866B2 (en) * 2005-01-27 2010-10-26 Sony Corporation Method and system for retrieving content in network system
WO2006091654A2 (en) * 2005-02-23 2006-08-31 Trans World New York Llc Digital content distribution systems and methods
CN100358050C (en) * 2005-05-25 2007-12-26 深圳兆日技术有限公司 Method hidden ROM for protecting data of storage
JP4795727B2 (en) 2005-06-14 2011-10-19 ヒタチグローバルストレージテクノロジーズネザーランドビーブイ Method, storage device, and system for restricting content use terminal
JP2007006380A (en) * 2005-06-27 2007-01-11 Toshiba Corp Information processing apparatus capable of receiving digital broadcasting program data and content protecting method in its apparatus
US8644669B2 (en) 2005-06-27 2014-02-04 Panasonic Corporation Recording medium, reproduction device, message acquisition method, message acquisition program, integrated circuit
JP4763368B2 (en) * 2005-07-12 2011-08-31 パナソニック株式会社 COMMUNICATION CARD, CONFIDENTIAL INFORMATION PROCESSING SYSTEM, CONFIDENTIAL INFORMATION TRANSFER METHOD, AND PROGRAM
US7634816B2 (en) * 2005-08-11 2009-12-15 Microsoft Corporation Revocation information management
US7831043B2 (en) * 2006-08-27 2010-11-09 International Business Machines Corporation System and method for cryptographically authenticating data items
WO2008032002A1 (en) * 2006-09-15 2008-03-20 France Telecom Method of securing access to a content recorded on a storage means
CN101165698B (en) * 2006-10-17 2011-07-27 华为技术有限公司 Export permitting method and system
JP4909026B2 (en) * 2006-11-22 2012-04-04 キヤノン株式会社 Receiving apparatus, method, and program
CN101542471A (en) * 2007-01-19 2009-09-23 Lg电子株式会社 Method for protecting content and method for processing information
KR101424973B1 (en) * 2008-01-02 2014-08-04 삼성전자주식회사 Method, recording medium and apparatus for updating revocation list and reproducing encrypted contents
JP5173563B2 (en) * 2008-05-02 2013-04-03 キヤノン株式会社 License management apparatus and method
JP4519935B2 (en) * 2008-12-26 2010-08-04 株式会社東芝 Information communication method, communication terminal device, and information communication system
KR200454826Y1 (en) 2009-06-26 2011-07-28 인터내셔날 커런시 테크놀로지 코포레이션 License checker
JP5552870B2 (en) * 2010-04-01 2014-07-16 ソニー株式会社 Memory device, host device, and memory system
JP2011238062A (en) * 2010-05-11 2011-11-24 Sony Corp Server apparatus, program, and information processing system
JP5306405B2 (en) * 2011-03-31 2013-10-02 株式会社東芝 Information processing apparatus and program
WO2017022386A1 (en) * 2015-08-04 2017-02-09 ソニー株式会社 Information processing device, information storage device, information processing method, and program
US10540298B2 (en) 2017-09-28 2020-01-21 Hewlett Packard Enterprise Development Lp Protected datasets on tape cartridges

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4740890A (en) * 1983-12-22 1988-04-26 Software Concepts, Inc. Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media
JPH0765139A (en) * 1993-08-23 1995-03-10 Mitsubishi Electric Corp Ic memopry card
US5400319A (en) 1993-10-06 1995-03-21 Digital Audio Disc Corporation CD-ROM with machine-readable I.D. code
US5805551A (en) * 1994-04-18 1998-09-08 Matsushita Electric Industrial Co., Ltd. Method and apparatus for preventing illegal copy or illegal installation of information of optical recording medium
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
DE69637733D1 (en) * 1995-02-13 2008-12-11 Intertrust Tech Corp SYSTEMS AND METHOD FOR SAFE TRANSMISSION
US5857021A (en) * 1995-11-07 1999-01-05 Fujitsu Ltd. Security system for protecting information stored in portable storage media
US5699431A (en) * 1995-11-13 1997-12-16 Northern Telecom Limited Method for efficient management of certificate revocation lists and update information
JP2000503154A (en) * 1996-01-11 2000-03-14 エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
US5599431A (en) 1996-04-18 1997-02-04 Metfab Sales & Service, Inc. Electroplating solution barrier device
US5805699A (en) 1996-05-20 1998-09-08 Fujitsu Limited Software copying system
US6278836B1 (en) * 1996-08-27 2001-08-21 Matsushita Electric Industrial Co., Ltd. Information reproducing apparatus for reproducing video signals and program information which are recorded in information recording media
US6052780A (en) * 1996-09-12 2000-04-18 Open Security Solutions, Llc Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
US5818771A (en) * 1996-09-30 1998-10-06 Hitachi, Ltd. Semiconductor memory device
US5949877A (en) * 1997-01-30 1999-09-07 Intel Corporation Content protection for transmission systems
US6092201A (en) 1997-10-24 2000-07-18 Entrust Technologies Method and apparatus for extending secure communication operations via a shared list
JP3272283B2 (en) * 1997-11-14 2002-04-08 富士通株式会社 Electronic data storage device
US6128740A (en) 1997-12-08 2000-10-03 Entrust Technologies Limited Computer security system and method with on demand publishing of certificate revocation lists
JP4496440B2 (en) 1998-01-12 2010-07-07 ソニー株式会社 Encrypted content transmission device
JPH11259407A (en) * 1998-03-11 1999-09-24 Fuji Xerox Co Ltd Electronic information use promoting system
US6233341B1 (en) * 1998-05-19 2001-05-15 Visto Corporation System and method for installing and using a temporary certificate at a remote site
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
JP4621314B2 (en) * 1999-06-16 2011-01-26 株式会社東芝 Storage medium
US6850914B1 (en) * 1999-11-08 2005-02-01 Matsushita Electric Industrial Co., Ltd. Revocation information updating method, revocation informaton updating apparatus and storage medium
JP4348818B2 (en) * 2000-03-10 2009-10-21 ソニー株式会社 Data distribution system and method, and data recording medium
JP2001256113A (en) * 2000-03-13 2001-09-21 Toshiba Corp Contents processing system and contents protection method

Also Published As

Publication number Publication date
US7392225B2 (en) 2008-06-24
CN1203413C (en) 2005-05-25
JP2001166996A (en) 2001-06-22
US20050154880A1 (en) 2005-07-14
JP3312024B2 (en) 2002-08-05
US6581160B1 (en) 2003-06-17
KR100729901B1 (en) 2007-06-18
EP1098311B1 (en) 2003-02-26
US6850914B1 (en) 2005-02-01
DE60001478D1 (en) 2003-04-03
CN1313550A (en) 2001-09-19
DE60001478T2 (en) 2003-08-28
EP1098311A1 (en) 2001-05-09
KR20010051534A (en) 2001-06-25

Similar Documents

Publication Publication Date Title
TW556160B (en) Revocation information updating method, revocation information updating apparatus and storage medium
EP1166265B1 (en) Copy security for portable music players
JP5200204B2 (en) A federated digital rights management mechanism including a trusted system
US7930558B2 (en) Data recorder restoring original data allowed to exist only uniquely
JP2006504176A (en) Method and apparatus for permitting content operation
US20050021948A1 (en) Secure single drive copy method and apparatus
US20030016829A1 (en) System and method for protecting content data
US20030046568A1 (en) Media protection system and method and hardware decryption module used therein
US20070156587A1 (en) Content Protection Using Encryption Key Embedded with Content File
JP2005080315A (en) System and method for providing service
KR20070009983A (en) Method of authorizing access to content
JP2000503154A (en) System for controlling access and distribution of digital ownership
KR20010085892A (en) Copy protection system and method
JP2003058840A (en) Information protection management program utilizing rfid-loaded computer recording medium
JP2000138664A (en) Protecting method of utilizing open key ciphering system
JP2005503719A (en) Secure delivery method and system for digital documents
US20040034788A1 (en) Intellectual property protection and verification utilizing keystroke dynamics
JP2007124717A (en) System for preventing illegal copying of digital content
US20050089164A1 (en) System and method for the production and distribution of copy-protected and use-protected electronic audio and visual media and the data contents thereof
JP5030426B2 (en) Secure pre-recording medium
JP3983937B2 (en) Storage medium and content management method using the same
JP2007011643A (en) Digital content distribution system and token device
US20040123126A1 (en) Method and apparatus for deterring piracy
JPH10240517A (en) Method and device for preventing duplication of software
JP2006506762A (en) Secure local copy protection

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees